<cvrf:cvrfdoc
  xmlns:vuln="http://www.icasi.org/CVRF/schema/vuln/1.1"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:cvrf-common="http://www.icasi.org/CVRF/schema/common/1.1"
  xmlns:prod="http://www.icasi.org/CVRF/schema/prod/1.1"
  xmlns:scap-core="https://scap.nist.gov/schema/scap-core/1.0"
  xmlns:cvssv2="https://scap.nist.gov/schema/cvss-v2/1.0"
  xmlns:cpe-lang="http://cpe.mitre.org/language/2.0"
  xmlns:sch="http://purl.oclc.org/dsdl/schematron"
  xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <cvrf:DocumentTitle>December 2023 Security Updates</cvrf:DocumentTitle>
  <cvrf:DocumentType>Security Update</cvrf:DocumentType>
  <cvrf:DocumentPublisher
    Type="Vendor">
    <cvrf:ContactDetails>secure@microsoft.com</cvrf:ContactDetails>
    <cvrf:IssuingAuthority>The Microsoft Security Response Center (MSRC) identifies, monitors, resolves, and responds to security incidents and Microsoft software security vulnerabilities. For more information, see http://www.microsoft.com/security/msrc.</cvrf:IssuingAuthority>
  </cvrf:DocumentPublisher>
  <cvrf:DocumentTracking>
    <cvrf:Identification>
      <cvrf:ID>2023-Dec</cvrf:ID>
      <cvrf:Alias>2023-Dec</cvrf:Alias>
    </cvrf:Identification>
    <cvrf:Status>Final</cvrf:Status>
    <cvrf:Version>1.0</cvrf:Version>
    <cvrf:RevisionHistory>
      <cvrf:Revision>
        <cvrf:Number>101</cvrf:Number>
        <cvrf:Date>2026-02-20T23:38:03</cvrf:Date>
        <cvrf:Description>December 2023 Security Updates</cvrf:Description>
      </cvrf:Revision>
    </cvrf:RevisionHistory>
    <cvrf:InitialReleaseDate>2023-12-12T08:00:00</cvrf:InitialReleaseDate>
    <cvrf:CurrentReleaseDate>2026-02-20T23:38:03</cvrf:CurrentReleaseDate>
  </cvrf:DocumentTracking>
  <cvrf:DocumentNotes>
    <cvrf:Note
      Title="Release Notes"
      Audience="Public"
      Type="Details"
      Ordinal="0">&lt;h2 id="this-release-consists-of-the-following-37-microsoft-cves"&gt;This release consists of the following 37 Microsoft CVEs:&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tag&lt;/th&gt;
&lt;th&gt;CVE&lt;/th&gt;
&lt;th&gt;Base Score&lt;/th&gt;
&lt;th&gt;CVSS Vector&lt;/th&gt;
&lt;th&gt;Exploitability&lt;/th&gt;
&lt;th&gt;FAQs?&lt;/th&gt;
&lt;th&gt;Workarounds?&lt;/th&gt;
&lt;th&gt;Mitigations?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Windows Media&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21740"&gt;CVE-2023-21740&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Azure DevOps&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21751"&gt;CVE-2023-21751&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35618"&gt;CVE-2023-35618&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;9.6&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Outlook&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35619"&gt;CVE-2023-35619&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.3&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Dynamics&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35621"&gt;CVE-2023-35621&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Windows DNS&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35622"&gt;CVE-2023-35622&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Azure Connected Machine Agent&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35624"&gt;CVE-2023-35624&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.3&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Azure Machine Learning&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35625"&gt;CVE-2023-35625&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;4.7&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows MSHTML Platform&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35628"&gt;CVE-2023-35628&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.1&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows USB Mass Storage Class Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35629"&gt;CVE-2023-35629&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Internet Connection Sharing (ICS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35630"&gt;CVE-2023-35630&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Win32K&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35631"&gt;CVE-2023-35631&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Internet Connection Sharing (ICS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35632"&gt;CVE-2023-35632&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Kernel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35633"&gt;CVE-2023-35633&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Bluetooth Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35634"&gt;CVE-2023-35634&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Kernel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35635"&gt;CVE-2023-35635&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Outlook&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35636"&gt;CVE-2023-35636&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows DHCP Server&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35638"&gt;CVE-2023-35638&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows ODBC Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35639"&gt;CVE-2023-35639&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Internet Connection Sharing (ICS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35641"&gt;CVE-2023-35641&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Internet Connection Sharing (ICS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35642"&gt;CVE-2023-35642&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows DHCP Server&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35643"&gt;CVE-2023-35643&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Kernel-Mode Drivers&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-35644"&gt;CVE-2023-35644&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;XAML Diagnostics&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36003"&gt;CVE-2023-36003&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.7&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows DPAPI (Data Protection Application Programming Interface)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36004"&gt;CVE-2023-36004&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Telephony Server&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36005"&gt;CVE-2023-36005&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft WDAC OLE DB provider for SQL&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36006"&gt;CVE-2023-36006&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Word&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36009"&gt;CVE-2023-36009&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Defender&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36010"&gt;CVE-2023-36010&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Win32K&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36011"&gt;CVE-2023-36011&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows DHCP Server&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36012"&gt;CVE-2023-36012&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.3&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Power Platform Connector&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36019"&gt;CVE-2023-36019&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;9.6&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Dynamics&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36020"&gt;CVE-2023-36020&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.6&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Local Security Authority Subsystem Service (LSASS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36391"&gt;CVE-2023-36391&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Cloud Files Mini Filter Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36696"&gt;CVE-2023-36696&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-36880"&gt;CVE-2023-36880&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;4.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-38174"&gt;CVE-2023-38174&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;4.3&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="we-are-republishing-6-non-microsoft-cves"&gt;We are republishing 6 non-Microsoft CVEs:&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;CNA&lt;/th&gt;
&lt;th&gt;Tag&lt;/th&gt;
&lt;th&gt;CVE&lt;/th&gt;
&lt;th&gt;FAQs?&lt;/th&gt;
&lt;th&gt;Workarounds?&lt;/th&gt;
&lt;th&gt;Mitigations?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-6508"&gt;CVE-2023-6508&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-6509"&gt;CVE-2023-6509&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-6510"&gt;CVE-2023-6510&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-6511"&gt;CVE-2023-6511&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-6512"&gt;CVE-2023-6512&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;AMD&lt;/td&gt;
&lt;td&gt;Chipsets&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-20588"&gt;CVE-2023-20588&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="security-update-guide-blog-posts"&gt;Security Update Guide Blog Posts&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Date&lt;/th&gt;
&lt;th&gt;Blog Post&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;January 11, 2022&lt;/td&gt;
&lt;td&gt;&lt;a href="https://aka.ms/SUGNotificationProfile"&gt;Coming Soon: New Security Update Guide Notification System&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;February 9, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/02/09/continuing-to-listen-good-news-about-the-security-update-guide-api/"&gt;Continuing to Listen: Good News about the Security Update Guide API&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;January 13, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;December 8, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/12/08/security-update-guide-lets-keep-the-conversation-going/"&gt;Security Update Guide: Let’s keep the conversation going&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;November 9, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/11/09/vulnerability-descriptions-in-the-new-version-of-the-security-update-guide/"&gt;Vulnerability Descriptions in the New Version of the Security Update Guide&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="relevant-resources"&gt;Relevant Resources&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The new Hotpatching feature is now generally available. Please see &lt;a href="https://docs.microsoft.com/en-us/azure/automanage/automanage-hotpatch?WT.mc_id=modinfra-18529-thmaure"&gt;Hotpatching feature for Windows Server Azure Edition virtual machines (VMs)&lt;/a&gt; for more information.&lt;/li&gt;
&lt;li&gt;Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the &lt;a href="https://www.catalog.update.microsoft.com/Home.aspx"&gt;Microsoft Update Catalog&lt;/a&gt;. For information on lifecycle and support dates for Windows 10 operating systems, please see &lt;a href="https://docs.microsoft.com/en-us/lifecycle/faq/windows"&gt;Windows Lifecycle Facts Sheet&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Microsoft is improving Windows Release Notes. For more information, please see &lt;a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/what-s-next-for-windows-release-notes/ba-p/1754399"&gt;What's next for Windows release notes&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A list of the latest servicing stack updates for each operating system can be found in &lt;a href="https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV990001"&gt;ADV990001&lt;/a&gt;. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.&lt;/li&gt;
&lt;li&gt;In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.&lt;/li&gt;
&lt;li&gt;Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See &lt;a href="https://support.microsoft.com/en-us/topic/procedure-to-continue-receiving-security-updates-after-extended-support-ends-on-january-14-2020-48c59204-fe67-3f42-84fc-c3c3145ff28e"&gt;4522133&lt;/a&gt; for more information.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="known-issues"&gt;Known Issues&lt;/h2&gt;
&lt;p&gt;You can see these in more detail from the Deployments tab by selecting &lt;strong&gt;Known Issues&lt;/strong&gt; column in the &lt;strong&gt;Edit Columns&lt;/strong&gt; panel.&lt;/p&gt;
&lt;p&gt;For more information about Windows Known Issues, please see &lt;a href="https://docs.microsoft.com/en-us/windows/release-information/windows-message-center"&gt;Windows message center&lt;/a&gt; (links to currently-supported versions of Windows are in the left pane).&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;KB Article&lt;/th&gt;
&lt;th&gt;Applies To&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5033369"&gt;5033369&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 11, version 21H2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5033371"&gt;5033371&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, version 1809, Windows Server 2019&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5033372"&gt;5033372&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, version 21H2, Windows 10, version 22H2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5033375"&gt;5033375&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 11, version 22H2, Windows 11, version 23H2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5033422"&gt;5033422&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5033424"&gt;5033424&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 R2 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5033427"&gt;5033427&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5033433"&gt;5033433&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 R2 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</cvrf:Note>
    <cvrf:Note
      Title="Legal Disclaimer"
      Audience="Public"
      Type="Legal Disclaimer"
      Ordinal="1">The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.</cvrf:Note>
  </cvrf:DocumentNotes>
  <prod:ProductTree>
    <prod:Branch
      Type="Vendor"
      Name="Microsoft">
      <prod:Branch
        Type="Product Family"
        Name="Windows">
        <prod:FullProductName
          ProductID="11568">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11569">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11570">Windows 10 Version 1809 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11571">Windows Server 2019</prod:FullProductName>
        <prod:FullProductName
          ProductID="11572">Windows Server 2019 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11923">Windows Server 2022</prod:FullProductName>
        <prod:FullProductName
          ProductID="11924">Windows Server 2022 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11926">Windows 11 version 21H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11927">Windows 11 version 21H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11929">Windows 10 Version 21H2 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11930">Windows 10 Version 21H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11931">Windows 10 Version 21H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12085">Windows 11 Version 22H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12086">Windows 11 Version 22H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12097">Windows 10 Version 22H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12098">Windows 10 Version 22H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12099">Windows 10 Version 22H2 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12244">Windows Server 2022, 23H2 Edition (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="12243">Windows 11 Version 23H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12242">Windows 11 Version 23H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10729">Windows 10 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10735">Windows 10 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10852">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10853">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10816">Windows Server 2016</prod:FullProductName>
        <prod:FullProductName
          ProductID="10855">Windows Server 2016 (Server Core installation)</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Microsoft Dynamics">
        <prod:FullProductName
          ProductID="11921">Microsoft Dynamics 365 (on-premises) version 9.1</prod:FullProductName>
        <prod:FullProductName
          ProductID="11664">Microsoft Dynamics 365 (on-premises) version 9.0</prod:FullProductName>
        <prod:FullProductName
          ProductID="12263">Microsoft Power Platform</prod:FullProductName>
        <prod:FullProductName
          ProductID="12268">Dynamics 365 for Finance and Operations Version 10.0.38 Platform Update 62</prod:FullProductName>
        <prod:FullProductName
          ProductID="12267">Dynamics 365 for Finance and Operations Version 10.0.37 Platform Update 61</prod:FullProductName>
        <prod:FullProductName
          ProductID="12269">Dynamics 365 for Finance and Operations Platform Update 60</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Microsoft Office">
        <prod:FullProductName
          ProductID="11573">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11574">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11762">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11763">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11951">Microsoft Office LTSC for Mac 2021</prod:FullProductName>
        <prod:FullProductName
          ProductID="11952">Microsoft Office LTSC 2021 for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11953">Microsoft Office LTSC 2021 for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="10753">Microsoft Office 2016 (32-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10754">Microsoft Office 2016 (64-bit edition)</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="ESU">
        <prod:FullProductName
          ProductID="10378">Windows Server 2012</prod:FullProductName>
        <prod:FullProductName
          ProductID="10379">Windows Server 2012 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10483">Windows Server 2012 R2</prod:FullProductName>
        <prod:FullProductName
          ProductID="10543">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10051">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10049">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="9312">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
        <prod:FullProductName
          ProductID="10287">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="9318">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
        <prod:FullProductName
          ProductID="9344">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Browser">
        <prod:FullProductName
          ProductID="11655">Microsoft Edge (Chromium-based)</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Azure">
        <prod:FullProductName
          ProductID="12266">Azure Machine Learning SDK</prod:FullProductName>
        <prod:FullProductName
          ProductID="12228">Azure Logic Apps</prod:FullProductName>
        <prod:FullProductName
          ProductID="12264">Azure Connected Machine Agent</prod:FullProductName>
        <prod:FullProductName
          ProductID="12270">Azure DevOps Server 2022.1</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="System Center">
        <prod:FullProductName
          ProductID="12183">Microsoft Malware Protection Platform</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Developer Tools">
        <prod:FullProductName
          ProductID="12143">Azure DevOps Server 2020.1.2</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Mariner">
        <prod:FullProductName
          ProductID="12139">CBL Mariner 2.0 x64</prod:FullProductName>
        <prod:FullProductName
          ProductID="12140">CBL Mariner 2.0 ARM</prod:FullProductName>
      </prod:Branch>
    </prod:Branch>
    <prod:FullProductName
      ProductID="10049"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26864:*:*:*:*:*:x64:*">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10051"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26864:*:*:*:*:*:x64:*">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10287"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22413:*:*:*:*:*:x64:*">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10378"
      CPE="cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24614:*:*:*:*:*:x64:*">Windows Server 2012</prod:FullProductName>
    <prod:FullProductName
      ProductID="10379"
      CPE="cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24614:*:*:*:*:*:x64:*">Windows Server 2012 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10483"
      CPE="cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21715:*:*:*:*:*:x64:*">Windows Server 2012 R2</prod:FullProductName>
    <prod:FullProductName
      ProductID="10543"
      CPE="cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21715:*:*:*:*:*:x64:*">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10729"
      CPE="cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20345:*:*:*:*:*:x86:*">Windows 10 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10735"
      CPE="cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20345:*:*:*:*:*:x64:*">Windows 10 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10753"
      CPE="cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*">Microsoft Office 2016 (32-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10754"
      CPE="cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*">Microsoft Office 2016 (64-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10816"
      CPE="cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6529:*:*:*:*:*:*:*">Windows Server 2016</prod:FullProductName>
    <prod:FullProductName
      ProductID="10852"
      CPE="cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6529:*:*:*:*:*:x86:*">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10853"
      CPE="cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.6529:*:*:*:*:*:x64:*">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10855"
      CPE="cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6529:*:*:*:*:*:*:*">Windows Server 2016 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11568"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.5206:*:*:*:*:*:x86:*">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11569"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.5206:*:*:*:*:*:x64:*">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11570"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.5206:*:*:*:*:*:arm64:*">Windows 10 Version 1809 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11571"
      CPE="cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.5206:*:*:*:*:*:*:*">Windows Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="11572"
      CPE="cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.5206:*:*:*:*:*:*:*">Windows Server 2019 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11573"
      CPE="cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11574"
      CPE="cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11655"
      CPE="cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*">Microsoft Edge (Chromium-based)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11664"
      CPE="cpe:2.3:a:microsoft:dynamics_365:9.0:*:*:*:on-premises:*:*:*">Microsoft Dynamics 365 (on-premises) version 9.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="11762"
      CPE="cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11763"
      CPE="cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11921"
      CPE="cpe:2.3:a:microsoft:dynamics_365:9.1:*:*:*:on-premises:*:*:*">Microsoft Dynamics 365 (on-premises) version 9.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="11923"
      CPE="cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2159:*:*:*:*:*:*:*">Windows Server 2022</prod:FullProductName>
    <prod:FullProductName
      ProductID="11924"
      CPE="cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2159:*:*:*:*:*:*:*">Windows Server 2022 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11926"
      CPE="cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.2652:*:*:*:*:*:x64:*">Windows 11 version 21H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11927"
      CPE="cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.2652:*:*:*:*:*:arm64:*">Windows 11 version 21H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11929"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19041.3803:*:*:*:*:*:x86:*">Windows 10 Version 21H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11930"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19041.3803:*:*:*:*:*:arm64:*">Windows 10 Version 21H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11931"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19041.3803:*:*:*:*:*:x64:*">Windows 10 Version 21H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11951"
      CPE="cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*">Microsoft Office LTSC for Mac 2021</prod:FullProductName>
    <prod:FullProductName
      ProductID="11952"
      CPE="cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*">Microsoft Office LTSC 2021 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11953"
      CPE="cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*">Microsoft Office LTSC 2021 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="12085"
      CPE="cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.2861:*:*:*:*:*:arm64:*">Windows 11 Version 22H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12086"
      CPE="cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.2861:*:*:*:*:*:x64:*">Windows 11 Version 22H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12097"
      CPE="cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.3803:*:*:*:*:*:x64:*">Windows 10 Version 22H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12098"
      CPE="cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.3803:*:*:*:*:*:arm64:*">Windows 10 Version 22H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12099"
      CPE="cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.3803:*:*:*:*:*:x86:*">Windows 10 Version 22H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12139"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:2.0:*:*:*:*:*:*:x64">CBL Mariner 2.0 x64</prod:FullProductName>
    <prod:FullProductName
      ProductID="12140"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:2.0:*:*:*:*:*:*:arm">CBL Mariner 2.0 ARM</prod:FullProductName>
    <prod:FullProductName
      ProductID="12143"
      CPE="cpe:2.3:o:microsoft:azure_devops_server:2020:-:*:*:*:*:*:*">Azure DevOps Server 2020.1.2</prod:FullProductName>
    <prod:FullProductName
      ProductID="12183"
      CPE="cpe:2.3:a:microsoft:malware_protection_platform:*:*:*:*:*:*:*:*">Microsoft Malware Protection Platform</prod:FullProductName>
    <prod:FullProductName
      ProductID="12228"
      CPE="cpe:2.3:a:microsoft:azure_logic_apps:*:*:*:*:*:*:*:*">Azure Logic Apps</prod:FullProductName>
    <prod:FullProductName
      ProductID="12242"
      CPE="cpe:2.3:o:microsoft:windows_11_23H2:10.0.22621.2861:*:*:*:*:*:arm64:*">Windows 11 Version 23H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12243"
      CPE="cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.2861:*:*:*:*:*:x64:*">Windows 11 Version 23H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12244"
      CPE="cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.584:*:*:*:*:*:*:*">Windows Server 2022, 23H2 Edition (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="12263"
      CPE="cpe:2.3:a:microsoft:power_platform:*:*:*:*:*:*:*:*">Microsoft Power Platform</prod:FullProductName>
    <prod:FullProductName
      ProductID="12264"
      CPE="cpe:2.3:a:microsoft:azure_connected_machine_agent:-:*:*:*:*:*:*:*">Azure Connected Machine Agent</prod:FullProductName>
    <prod:FullProductName
      ProductID="12266"
      CPE="cpe:2.3:a:microsoft:azure_machine_learning_sdk:*:*:*:*:*:*:*:*">Azure Machine Learning SDK</prod:FullProductName>
    <prod:FullProductName
      ProductID="12267"
      CPE="cpe:2.3:a:microsoft:dynamics_365:-:*:*:*:*:finance_and_operations:*:*">Dynamics 365 for Finance and Operations Version 10.0.37 Platform Update 61</prod:FullProductName>
    <prod:FullProductName
      ProductID="12268"
      CPE="cpe:2.3:a:microsoft:dynamics_365:-:*:*:*:*:finance_and_operations:*:*">Dynamics 365 for Finance and Operations Version 10.0.38 Platform Update 62</prod:FullProductName>
    <prod:FullProductName
      ProductID="12269"
      CPE="cpe:2.3:a:microsoft:dynamics_365:-:*:*:*:*:finance_and_operations:*:*">Dynamics 365 for Finance and Operations Platform Update 60</prod:FullProductName>
    <prod:FullProductName
      ProductID="12270"
      CPE="cpe:2.3:o:microsoft:azure_devops_server:2022.1:-:*:*:*:*:*:*">Azure DevOps Server 2022.1</prod:FullProductName>
    <prod:FullProductName
      ProductID="16838-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.153.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.153.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="16928-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libglvnd_1.7.0-2:*:*:*:*:*:*:*:*">azl3 libglvnd 1.7.0-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17062-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.29.1-4:*:*:*:*:*:*:*:*">azl3 kernel 6.6.29.1-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17065-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.35.1-4:*:*:*:*:*:*:*:*">azl3 kernel 6.6.35.1-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17095-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.180.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.180.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17174-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_postgresql_14.14-1:*:*:*:*:*:*:*:*">cbl2 postgresql 14.14-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17183-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_rust_1.72.0-10:*:*:*:*:*:*:*:*">cbl2 rust 1.72.0-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17218-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_mysql_8.0.40-1:*:*:*:*:*:*:*:*">cbl2 mysql 8.0.40-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17375-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.21.6-1:*:*:*:*:*:*:*:*">cbl2 golang 1.21.6-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17384-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-15:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-15 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17405-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_telegraf_1.28.5-5:*:*:*:*:*:*:*:*">cbl2 telegraf 1.28.5-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17414-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_moby-compose_2.17.3-5:*:*:*:*:*:*:*:*">cbl2 moby-compose 2.17.3-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17445-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_ansible_2.14.12-2:*:*:*:*:*:*:*:*">cbl2 ansible 2.14.12-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17445-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_ansible_2.14.12-2:*:*:*:*:*:*:*:*">cbl2 ansible 2.14.12-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17452-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.148.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.148.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17607-17084"
      CPE="cpe:2.3:a:microsoft:azl3_mysql_8.0.40-1:*:*:*:*:*:*:*:*">azl3 mysql 8.0.40-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17642-17084"
      CPE="cpe:2.3:a:microsoft:azl3_nmap_7.95-2:*:*:*:*:*:*:*:*">azl3 nmap 7.95-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17667-17084"
      CPE="cpe:2.3:a:microsoft:azl3_tensorflow_2.16.1-9:*:*:*:*:*:*:*:*">azl3 tensorflow 2.16.1-9 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17680-17084"
      CPE="cpe:2.3:a:microsoft:azl3_qtbase_6.6.2-1:*:*:*:*:*:*:*:*">azl3 qtbase 6.6.2-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17712-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python3_3.12.3-1:*:*:*:*:*:*:*:*">azl3 python3 3.12.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17734-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cmake_3.29.6-1:*:*:*:*:*:*:*:*">azl3 cmake 3.29.6-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17748-17084"
      CPE="cpe:2.3:a:microsoft:azl3_hyperv-daemons_6.6.29.1-1:*:*:*:*:*:*:*:*">azl3 hyperv-daemons 6.6.29.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17753-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kubernetes_1.30.1-1:*:*:*:*:*:*:*:*">azl3 kubernetes 1.30.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17766-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cert-manager_1.12.12-1:*:*:*:*:*:*:*:*">azl3 cert-manager 1.12.12-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17785-17084"
      CPE="cpe:2.3:a:microsoft:azl3_hyperv-daemons_6.6.22.1-2:*:*:*:*:*:*:*:*">azl3 hyperv-daemons 6.6.22.1-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17793-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libcontainers-common_20240213-3:*:*:*:*:*:*:*:*">azl3 libcontainers-common 20240213-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17801-17084"
      CPE="cpe:2.3:a:microsoft:azl3_docker-buildx_0.14.0-1:*:*:*:*:*:*:*:*">azl3 docker-buildx 0.14.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17809-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cmake_3.28.2-6:*:*:*:*:*:*:*:*">azl3 cmake 3.28.2-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17822-17084"
      CPE="cpe:2.3:a:microsoft:azl3_ansible_2.17.0-1:*:*:*:*:*:*:*:*">azl3 ansible 2.17.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17828-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_hyperv-daemons_5.15.145.2-1:*:*:*:*:*:*:*:*">cbl2 hyperv-daemons 5.15.145.2-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17843-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_perl_5.34.1-489:*:*:*:*:*:*:*:*">cbl2 perl 5.34.1-489 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17956-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_cmake_3.21.4-13:*:*:*:*:*:*:*:*">cbl2 cmake 3.21.4-13 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18016-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qemu_6.2.0-22:*:*:*:*:*:*:*:*">cbl2 qemu 6.2.0-22 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18041-17084"
      CPE="cpe:2.3:a:microsoft:azl3_packer_1.9.5-1:*:*:*:*:*:*:*:*">azl3 packer 1.9.5-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18082-17084"
      CPE="cpe:2.3:a:microsoft:azl3_node-problem-detector_0.8.15-4:*:*:*:*:*:*:*:*">azl3 node-problem-detector 0.8.15-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18085-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cf-cli_8.7.3-6:*:*:*:*:*:*:*:*">azl3 cf-cli 8.7.3-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18130-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_packer_1.9.5-3:*:*:*:*:*:*:*:*">cbl2 packer 1.9.5-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18145-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_msft-golang_1.21.5-1:*:*:*:*:*:*:*:*">cbl2 msft-golang 1.21.5-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18146-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.21.5-1:*:*:*:*:*:*:*:*">cbl2 golang 1.21.5-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18147-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_msft-golang_1.22.3-1.:*:*:*:*:*:*:*:*">cbl2 msft-golang 1.22.3-1. on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18156-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_msft-golang_1.20.0-1:*:*:*:*:*:*:*:*">cbl2 msft-golang 1.20.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18157-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.20.0-1:*:*:*:*:*:*:*:*">cbl2 golang 1.20.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18158-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.20.0-1:*:*:*:*:*:*:*:*">azl3 golang 1.20.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18163-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_telegraf_1.29.4-1:*:*:*:*:*:*:*:*">cbl2 telegraf 1.29.4-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18164-17084"
      CPE="cpe:2.3:a:microsoft:azl3_telegraf_1.29.4-1:*:*:*:*:*:*:*:*">azl3 telegraf 1.29.4-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18179-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-10:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18197-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_postfix_3.7.0-3:*:*:*:*:*:*:*:*">cbl2 postfix 3.7.0-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18198-17084"
      CPE="cpe:2.3:a:microsoft:azl3_postfix_3.9.0-1:*:*:*:*:*:*:*:*">azl3 postfix 3.9.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18199-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_moby-engine_20.10.27-1:*:*:*:*:*:*:*:*">cbl2 moby-engine 20.10.27-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18200-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_jsch_0.1.55-2:*:*:*:*:*:*:*:*">cbl2 jsch 0.1.55-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18201-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_terraform_1.3.2-25:*:*:*:*:*:*:*:*">cbl2 terraform 1.3.2-25 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18202-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_moby-cli_20.10.27-2:*:*:*:*:*:*:*:*">cbl2 moby-cli 20.10.27-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18203-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kubevirt_0.59.0-26:*:*:*:*:*:*:*:*">cbl2 kubevirt 0.59.0-26 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18204-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kubernetes_1.28.4-4:*:*:*:*:*:*:*:*">cbl2 kubernetes 1.28.4-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18205-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_openssh_8.9p1-4:*:*:*:*:*:*:*:*">cbl2 openssh 8.9p1-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18206-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_nmap_7.93-2:*:*:*:*:*:*:*:*">cbl2 nmap 7.93-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18207-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libssh2_1.9.0-4:*:*:*:*:*:*:*:*">cbl2 libssh2 1.9.0-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18208-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libssh_0.10.6-1:*:*:*:*:*:*:*:*">cbl2 libssh 0.10.6-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18209-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_erlang_25.2-1:*:*:*:*:*:*:*:*">cbl2 erlang 25.2-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18210-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_cert-manager_1.11.2-7:*:*:*:*:*:*:*:*">cbl2 cert-manager 1.11.2-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18211-17084"
      CPE="cpe:2.3:a:microsoft:azl3_node-problem-detector_0.8.20-2:*:*:*:*:*:*:*:*">azl3 node-problem-detector 0.8.20-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18212-17084"
      CPE="cpe:2.3:a:microsoft:azl3_nmap_7.93-2:*:*:*:*:*:*:*:*">azl3 nmap 7.93-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18213-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libssh2_1.11.1-1:*:*:*:*:*:*:*:*">azl3 libssh2 1.11.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18214-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libssh_0.10.6-1:*:*:*:*:*:*:*:*">azl3 libssh 0.10.6-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18215-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kubevirt_1.2.0-9:*:*:*:*:*:*:*:*">azl3 kubevirt 1.2.0-9 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18216-17084"
      CPE="cpe:2.3:a:microsoft:azl3_erlang_26.2.3-1:*:*:*:*:*:*:*:*">azl3 erlang 26.2.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18217-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cf-cli_8.7.11-1:*:*:*:*:*:*:*:*">azl3 cf-cli 8.7.11-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18218-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_ansible_2.14.11-1:*:*:*:*:*:*:*:*">cbl2 ansible 2.14.11-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18220-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.143.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.143.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18221-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_shadow-utils_4.9-14:*:*:*:*:*:*:*:*">cbl2 shadow-utils 4.9-14 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18222-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_sudo_1.9.15p5-1:*:*:*:*:*:*:*:*">cbl2 sudo 1.9.15p5-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18223-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_apparmor_3.0.4-3:*:*:*:*:*:*:*:*">cbl2 apparmor 3.0.4-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18224-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_openssh_8.9p1-3:*:*:*:*:*:*:*:*">cbl2 openssh 8.9p1-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18225-17084"
      CPE="cpe:2.3:a:microsoft:azl3_openssh_9.7p1-1:*:*:*:*:*:*:*:*">azl3 openssh 9.7p1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18226-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_xorg-x11-server_1.20.10-5:*:*:*:*:*:*:*:*">cbl2 xorg-x11-server 1.20.10-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18227-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_ncurses_6.4-3:*:*:*:*:*:*:*:*">cbl2 ncurses 6.4-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18228-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libtiff_4.6.0-6:*:*:*:*:*:*:*:*">cbl2 libtiff 4.6.0-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18229-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libtiff_4.6.0-6:*:*:*:*:*:*:*:*">azl3 libtiff 4.6.0-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18230-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.145.2-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.145.2-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18231-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_bluez_5.63-5:*:*:*:*:*:*:*:*">cbl2 bluez 5.63-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18232-17084"
      CPE="cpe:2.3:a:microsoft:azl3_bluez_5.63-6:*:*:*:*:*:*:*:*">azl3 bluez 5.63-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18233-17084"
      CPE="cpe:2.3:a:microsoft:azl3_qemu_8.2.0-1:*:*:*:*:*:*:*:*">azl3 qemu 8.2.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18234-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_mysql_8.0.35-2:*:*:*:*:*:*:*:*">cbl2 mysql 8.0.35-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18235-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_curl_8.5.0-1:*:*:*:*:*:*:*:*">cbl2 curl 8.5.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18239-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_postgresql_14.10-1:*:*:*:*:*:*:*:*">cbl2 postgresql 14.10-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18240-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_fish_3.6.2-1:*:*:*:*:*:*:*:*">cbl2 fish 3.6.2-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18241-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_strongswan_5.9.10-3:*:*:*:*:*:*:*:*">cbl2 strongswan 5.9.10-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18242-17084"
      CPE="cpe:2.3:a:microsoft:azl3_strongswan_5.9.12-1:*:*:*:*:*:*:*:*">azl3 strongswan 5.9.12-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18315-17084"
      CPE="cpe:2.3:a:microsoft:azl3_gcc_13.2.0-7:*:*:*:*:*:*:*:*">azl3 gcc 13.2.0-7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18413-17084"
      CPE="cpe:2.3:a:microsoft:azl3_systemd_255-20:*:*:*:*:*:*:*:*">azl3 systemd 255-20 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18420-17084"
      CPE="cpe:2.3:a:microsoft:azl3_espeak-ng_1.52.0-1:*:*:*:*:*:*:*:*">azl3 espeak-ng 1.52.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18421-17084"
      CPE="cpe:2.3:a:microsoft:azl3_espeak-ng_1.51.1-1:*:*:*:*:*:*:*:*">azl3 espeak-ng 1.51.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18447-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_gcc_11.2.0-8:*:*:*:*:*:*:*:*">cbl2 gcc 11.2.0-8 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18469-17084"
      CPE="cpe:2.3:a:microsoft:azl3_mozjs_102.15.1-1:*:*:*:*:*:*:*:*">azl3 mozjs 102.15.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18535-17084"
      CPE="cpe:2.3:a:microsoft:azl3_qemu_6.2.0-18:*:*:*:*:*:*:*:*">azl3 qemu 6.2.0-18 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19089-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtsvg_5.12.11-6:*:*:*:*:*:*:*:*">cbl2 qt5-qtsvg 5.12.11-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19262-17084"
      CPE="cpe:2.3:a:microsoft:azl3_postgresql_16.7-1:*:*:*:*:*:*:*:*">azl3 postgresql 16.7-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19339-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kubevirt_1.2.0-17:*:*:*:*:*:*:*:*">azl3 kubevirt 1.2.0-17 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19453-17084"
      CPE="cpe:2.3:a:microsoft:azl3_openssh_9.8p1-4:*:*:*:*:*:*:*:*">azl3 openssh 9.8p1-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19529-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.92.2-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.92.2-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19605-17084"
      CPE="cpe:2.3:a:microsoft:azl3_erlang_26.2.5.12-1:*:*:*:*:*:*:*:*">azl3 erlang 26.2.5.12-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19661-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_systemd_250.3-22:*:*:*:*:*:*:*:*">cbl2 systemd 250.3-22 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19664-17084"
      CPE="cpe:2.3:a:microsoft:azl3_telegraf_1.27.3-4:*:*:*:*:*:*:*:*">azl3 telegraf 1.27.3-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19666-17084"
      CPE="cpe:2.3:a:microsoft:azl3_ceph_18.2.2-8:*:*:*:*:*:*:*:*">azl3 ceph 18.2.2-8 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19667-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_systemd-bootstrap_250.3-13:*:*:*:*:*:*:*:*">cbl2 systemd-bootstrap 250.3-13 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19668-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_tensorflow_2.11.1-2:*:*:*:*:*:*:*:*">cbl2 tensorflow 2.11.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19671-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.75.0-14:*:*:*:*:*:*:*:*">azl3 rust 1.75.0-14 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19673-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.180.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.180.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19679-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.23.9-1:*:*:*:*:*:*:*:*">azl3 golang 1.23.9-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19686-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.86.0-1:*:*:*:*:*:*:*:*">azl3 rust 1.86.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19687-17084"
      CPE="cpe:2.3:a:microsoft:azl3_systemd-bootstrap_250.3-18:*:*:*:*:*:*:*:*">azl3 systemd-bootstrap 250.3-18 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19690-17084"
      CPE="cpe:2.3:a:microsoft:azl3_mysql_8.0.36-1:*:*:*:*:*:*:*:*">azl3 mysql 8.0.36-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19691-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_pytorch_2.5.1-1:*:*:*:*:*:*:*:*">cbl2 pytorch 2.5.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19692-17084"
      CPE="cpe:2.3:a:microsoft:azl3_systemd_255-21:*:*:*:*:*:*:*:*">azl3 systemd 255-21 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19693-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-tensorboard_2.16.2-6:*:*:*:*:*:*:*:*">azl3 python-tensorboard 2.16.2-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19697-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.24.3-1:*:*:*:*:*:*:*:*">azl3 golang 1.24.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19701-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_fluent-bit_2.1.10-3:*:*:*:*:*:*:*:*">cbl2 fluent-bit 2.1.10-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19710-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_ansible_2.14.12-2:*:*:*:*:*:*:*:*">cbl2 ansible 2.14.12-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19712-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_python-tensorboard_2.11.0-3:*:*:*:*:*:*:*:*">cbl2 python-tensorboard 2.11.0-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19716-17084"
      CPE="cpe:2.3:a:microsoft:azl3_ansible_2.15.3-1:*:*:*:*:*:*:*:*">azl3 ansible 2.15.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19718-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_gcc_11.2.0-8:*:*:*:*:*:*:*:*">cbl2 gcc 11.2.0-8 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19721-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_rust_1.72.0-10:*:*:*:*:*:*:*:*">cbl2 rust 1.72.0-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19727-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtsvg_5.12.11-6:*:*:*:*:*:*:*:*">cbl2 qt5-qtsvg 5.12.11-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19737-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-15:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-15 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19741-17084"
      CPE="cpe:2.3:a:microsoft:azl3_qtbase_6.6.1-1:*:*:*:*:*:*:*:*">azl3 qtbase 6.6.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19749-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_postfix_3.7.4-1:*:*:*:*:*:*:*:*">cbl2 postfix 3.7.4-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19753-17084"
      CPE="cpe:2.3:a:microsoft:azl3_postfix_3.7.0-2:*:*:*:*:*:*:*:*">azl3 postfix 3.7.0-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19759-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_sqlite_3.39.2-3:*:*:*:*:*:*:*:*">cbl2 sqlite 3.39.2-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19762-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.23.8-1:*:*:*:*:*:*:*:*">azl3 golang 1.23.8-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19778-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.17.13-2:*:*:*:*:*:*:*:*">cbl2 golang 1.17.13-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19785-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.18.8-7:*:*:*:*:*:*:*:*">cbl2 golang 1.18.8-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19808-17084"
      CPE="cpe:2.3:a:microsoft:azl3_docker-buildx_0.12.1-1:*:*:*:*:*:*:*:*">azl3 docker-buildx 0.12.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19817-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_cert-manager_1.11.2-22:*:*:*:*:*:*:*:*">cbl2 cert-manager 1.11.2-22 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19855-17084"
      CPE="cpe:2.3:a:microsoft:azl3_ncurses_6.4-2:*:*:*:*:*:*:*:*">azl3 ncurses 6.4-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19863-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cert-manager_1.11.2-8:*:*:*:*:*:*:*:*">azl3 cert-manager 1.11.2-8 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19874-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_hyperv-daemons_5.15.139.1-1:*:*:*:*:*:*:*:*">cbl2 hyperv-daemons 5.15.139.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19897-17084"
      CPE="cpe:2.3:a:microsoft:azl3_openssh_9.5p1-2:*:*:*:*:*:*:*:*">azl3 openssh 9.5p1-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19954-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_perl_5.34.1-490:*:*:*:*:*:*:*:*">cbl2 perl 5.34.1-490 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19962-17084"
      CPE="cpe:2.3:a:microsoft:azl3_packer_1.9.4-1:*:*:*:*:*:*:*:*">azl3 packer 1.9.4-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19964-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python3_3.12.0-4:*:*:*:*:*:*:*:*">azl3 python3 3.12.0-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19986-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kubernetes_1.29.1-4:*:*:*:*:*:*:*:*">azl3 kubernetes 1.29.1-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20013-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_telegraf_1.28.5-5:*:*:*:*:*:*:*:*">cbl2 telegraf 1.28.5-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20073-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libssh_0.10.5-2:*:*:*:*:*:*:*:*">azl3 libssh 0.10.5-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20127-17084"
      CPE="cpe:2.3:a:microsoft:azl3_strongswan_5.9.11-1:*:*:*:*:*:*:*:*">azl3 strongswan 5.9.11-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20442-17084"
      CPE="cpe:2.3:a:microsoft:azl3_apparmor_3.1.7-1:*:*:*:*:*:*:*:*">azl3 apparmor 3.1.7-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="9312"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22413:*:*:*:*:*:x64:*">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9318"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22413:*:*:*:*:*:x86:*">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9344"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22413:*:*:*:*:*:x86:*">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
  </prod:ProductTree>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title>strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-41913</vuln:CVE>
    <vuln:CWE
      ID="CWE-120">Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20127-17084</vuln:ProductID>
        <vuln:ProductID>18241-16823</vuln:ProductID>
        <vuln:ProductID>18242-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20127-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18241-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18242-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>20127-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18241-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18242-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20127-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18241-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18242-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20127-17084</vuln:ProductID>
        <vuln:ProductID>18242-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.9.12-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20127-17084</vuln:ProductID>
        <vuln:ProductID>18242-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18241-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.9.10-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18241-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-18T02:06:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title>Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value) and because the values do not resist flips of a single bit.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-42465</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18222-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18222-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18222-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18222-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18222-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.9.15p5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18222-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title>When saving HSTS data to an excessively long file name curl could end up
removing all contents making subsequent requests using that file unaware of
the HSTS status they should otherwise use.
</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-46219</vuln:CVE>
    <vuln:CWE
      ID="CWE-311">Missing Encryption of Sensitive Data</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19721-17086</vuln:ProductID>
        <vuln:ProductID>19690-17084</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:ProductID>17183-17086</vuln:ProductID>
        <vuln:ProductID>17218-16823</vuln:ProductID>
        <vuln:ProductID>18235-16823</vuln:ProductID>
        <vuln:ProductID>17734-17084</vuln:ProductID>
        <vuln:ProductID>17607-17084</vuln:ProductID>
        <vuln:ProductID>17809-17084</vuln:ProductID>
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19721-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19690-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17183-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17218-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18235-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17607-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17809-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19721-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19690-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17183-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17218-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18235-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17607-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17809-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19721-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19690-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17183-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17218-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18235-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17607-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17809-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19690-17084</vuln:ProductID>
        <vuln:ProductID>17218-16823</vuln:ProductID>
        <vuln:ProductID>17607-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.0.40-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19690-17084</vuln:ProductID>
        <vuln:ProductID>17218-16823</vuln:ProductID>
        <vuln:ProductID>17607-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18235-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.5.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18235-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17734-17084</vuln:ProductID>
        <vuln:ProductID>17809-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.29.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17734-17084</vuln:ProductID>
        <vuln:ProductID>17809-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.4</cvrf:Number>
        <cvrf:Date>2024-11-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mysql to Azure Linux 3.0
Added cmake to Azure Linux 3.0
Added mysql to CBL-Mariner 2.0
Added curl to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-02-18T03:12:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.2</cvrf:Number>
        <cvrf:Date>2024-10-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mysql to CBL-Mariner 2.0
Added curl to CBL-Mariner 2.0
Added cmake to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.3</cvrf:Number>
        <cvrf:Date>2024-10-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mysql to Azure Linux 3.0
Added cmake to Azure Linux 3.0
Added mysql to CBL-Mariner 2.0
Added curl to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.5</cvrf:Number>
        <cvrf:Date>2024-12-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mysql to Azure Linux 3.0
Added cmake to Azure Linux 3.0
Added mysql to CBL-Mariner 2.0
Added curl to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="21">
    <vuln:Title>cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_SetValuestring at cJSON.c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-50472</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16928-17084</vuln:ProductID>
        <vuln:ProductID>18223-16823</vuln:ProductID>
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:ProductID>19691-17086</vuln:ProductID>
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16928-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18223-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19691-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16928-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18223-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19691-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16928-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18223-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19691-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18223-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.0.4-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18223-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.2.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20442-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.1.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20442-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-19T01:16:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="25">
    <vuln:Title>In ssh-agent in OpenSSH before 9.6 certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys these constraints are only applied to the first key even if a PKCS#11 token returns multiple keys.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-51384</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19897-17084</vuln:ProductID>
        <vuln:ProductID>18224-16823</vuln:ProductID>
        <vuln:ProductID>18225-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19897-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18224-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18225-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19897-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18224-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18225-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19897-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18224-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18225-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19897-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.7p1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19897-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18224-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.9p1-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18224-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18225-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18225-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-18T01:22:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title>Postfix through 3.8.5 allows SMTP smuggling unless configured with smtpd_data_restrictions=reject_unauth_pipelining and smtpd_discard_ehlo_keywords=chunking (or certain other options that exist in recent versions). Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address allowing bypass of an SPF protection mechanism. This occurs because Postfix supports &lt;LF&gt;.&lt;CR&gt;&lt;LF&gt; but some other popular e-mail servers do not. To prevent attack variants (by always disallowing &lt;LF&gt; without &lt;CR&gt;) a different solution is required such as the smtpd_forbid_bare_newline=yes option with a Postfix minimum version of 3.5.23 3.6.13 3.7.9 3.8.4 or 3.9.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-51764</vuln:CVE>
    <vuln:CWE
      ID="CWE-345">Insufficient Verification of Data Authenticity</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19749-17086</vuln:ProductID>
        <vuln:ProductID>18197-16823</vuln:ProductID>
        <vuln:ProductID>18198-17084</vuln:ProductID>
        <vuln:ProductID>19753-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19749-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18197-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18198-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19753-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19749-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18197-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18198-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19753-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19749-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18197-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18198-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19753-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19749-17086</vuln:ProductID>
        <vuln:ProductID>18197-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.7.0-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19749-17086</vuln:ProductID>
        <vuln:ProductID>18197-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18198-17084</vuln:ProductID>
        <vuln:ProductID>19753-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.9.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18198-17084</vuln:ProductID>
        <vuln:ProductID>19753-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-01-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-18T02:00:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title>An issue was discovered in the Linux kernel before 6.6.8. atalk_ioctl in net/appletalk/ddp.c has a use-after-free because of an atalk_recvmsg race condition.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-51781</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>17095-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.148.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>17095-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:53:08</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title>Postgresql: memory disclosure in aggregate function calls</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-5868</vuln:CVE>
    <vuln:CWE
      ID="CWE-686">Function Call With Incorrect Argument Type</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18239-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18239-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18239-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18239-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18239-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.10-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18239-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="40">
    <vuln:Title>Xorg-x11-server: out-of-bounds memory reads/writes in xkb button actions</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6377</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18226-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18226-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18226-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18226-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18226-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.20.10-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18226-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-22T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="42">
    <vuln:Title>Groups not dropped before running subprocess when using empty 'extra_groups' parameter</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="PSF"
        Type="CNA"
        Ordinal="30">PSF</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6507</vuln:CVE>
    <vuln:CWE
      ID="CWE-269">Improper Privilege Management</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19964-17084</vuln:ProductID>
        <vuln:ProductID>17712-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19964-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17712-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19964-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17712-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19964-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17712-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19964-17084</vuln:ProductID>
        <vuln:ProductID>17712-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.12.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19964-17084</vuln:ProductID>
        <vuln:ProductID>17712-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:34:44</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title>Kernel: null pointer dereference vulnerability in nft_dynset_init()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6622</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18220-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.143.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18220-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-22T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>Use-after-free in Linux kernel's netfilter: nf_tables component</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Google"
        Type="CNA"
        Ordinal="30">Google</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6817</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18230-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18230-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18230-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18230-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18230-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.145.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18230-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-12-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-07-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2025-03-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="50">
    <vuln:Title>Out-of-bounds write in Linux kernel's Performance Events system component</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Google"
        Type="CNA"
        Ordinal="30">Google</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6931</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>18220-16823</vuln:ProductID>
        <vuln:ProductID>17065-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17065-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17065-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17065-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17065-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.35.1-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17065-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18220-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.143.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18220-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-08-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-19T01:11:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="13">
    <vuln:Title>Possible private key restoration in go package github.com/ecies/go</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-49292</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19679-17084</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.21.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:11:09</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T04:54:22</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title>Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Go"
        Type="CNA"
        Ordinal="30">Go</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-45287</vuln:CVE>
    <vuln:CWE
      ID="CWE-203">Observable Discrepancy</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19718-17086</vuln:ProductID>
        <vuln:ProductID>18315-17084</vuln:ProductID>
        <vuln:ProductID>19679-17084</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19712-17086</vuln:ProductID>
        <vuln:ProductID>19762-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
        <vuln:ProductID>18447-17086</vuln:ProductID>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:ProductID>18156-16823</vuln:ProductID>
        <vuln:ProductID>18157-16823</vuln:ProductID>
        <vuln:ProductID>18158-17084</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19718-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19762-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18447-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18156-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18157-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18158-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19718-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19762-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18447-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18156-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18157-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18158-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19718-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19762-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18447-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18156-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18157-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18158-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.21.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18156-16823</vuln:ProductID>
        <vuln:ProductID>18157-16823</vuln:ProductID>
        <vuln:ProductID>18158-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.20.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18156-16823</vuln:ProductID>
        <vuln:ProductID>18157-16823</vuln:ProductID>
        <vuln:ProductID>18158-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T21:28:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:50:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title>Shadow-utils: possible password leak during passwd(1) change</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-4641</vuln:CVE>
    <vuln:CWE
      ID="CWE-303">Incorrect Implementation of Authentication Algorithm</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18221-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18221-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18221-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18221-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18221-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.9-14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18221-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title>In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-47100</vuln:CVE>
    <vuln:CWE
      ID="CWE-755">Improper Handling of Exceptional Conditions</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19954-17086</vuln:ProductID>
        <vuln:ProductID>17843-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19954-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17843-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19954-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17843-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19954-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17843-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19954-17086</vuln:ProductID>
        <vuln:ProductID>17843-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.34.1-489</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19954-17086</vuln:ProductID>
        <vuln:ProductID>17843-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:27:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:19:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="17">
    <vuln:Title>Espeak-ng 1.52-dev was discovered to contain a Buffer Overflow</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-49993</vuln:CVE>
    <vuln:CWE
      ID="CWE-120">Buffer Copy without Checking Size of Input (&amp;#39;Classic Buffer Overflow&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.52.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:06:30</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="18">
    <vuln:Title>Espeak-ng 1.52-dev was discovered to contain a Floating Point Exception via the function PeaksToHarmspect at wavegen.c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-49994</vuln:CVE>
    <vuln:CWE
      ID="CWE-697">Incorrect Comparison</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.52.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:04:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title>Libtiff: heap-based buffer overflow in cpstriptotile() in tools/tiffcp.c</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6228</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18228-16823</vuln:ProductID>
        <vuln:ProductID>18229-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18228-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18229-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>18228-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>18229-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>18228-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18229-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18228-16823</vuln:ProductID>
        <vuln:ProductID>18229-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.6.0-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18228-16823</vuln:ProductID>
        <vuln:ProductID>18229-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-04-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mozilla"
        Type="CNA"
        Ordinal="30">mozilla</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6864</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:22:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:50:48</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title>Qemu: 9pfs: improper access control on special files</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="fedora"
        Type="CNA"
        Ordinal="30">fedora</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2861</vuln:CVE>
    <vuln:CWE
      ID="CWE-284">Improper Access Control</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18016-16823</vuln:ProductID>
        <vuln:ProductID>18233-17084</vuln:ProductID>
        <vuln:ProductID>18535-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18016-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18233-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18535-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18016-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18233-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18535-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18016-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18233-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.0</vuln:BaseScore>
        <vuln:TemporalScore>6.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18535-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18016-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.2.0-22</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18016-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18233-17084</vuln:ProductID>
        <vuln:ProductID>18535-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18233-17084</vuln:ProductID>
        <vuln:ProductID>18535-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-04-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added qemu to CBL-Mariner 2.0
Added qemu to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-18T01:44:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="6">
    <vuln:Title>Bluetooth HID Hosts in BlueZ may permit an unauthenticated Peripheral role HID Device to initiate and establish an encrypted connection and accept HID keyboard reports potentially permitting injection of HID messages when no user interaction has occurred in the Central role to authorize such access. An example affected package is bluez 5.64-0ubuntu1 in Ubuntu 22.04LTS. NOTE: in some cases a CVE-2020-0556 mitigation would have already addressed this Bluetooth HID Hosts issue.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-45866</vuln:CVE>
    <vuln:CWE
      ID="CWE-287">Improper Authentication</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18231-16823</vuln:ProductID>
        <vuln:ProductID>18232-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18231-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18232-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18231-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18232-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18231-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18232-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18231-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.63-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18231-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18232-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.63-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18232-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-11-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added bluez to Azure Linux 3.0
Added bluez to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-21T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="7">
    <vuln:Title>This flaw allows a malicious HTTP server to set "super cookies" in curl that
are then passed back to more origins than what is otherwise allowed or
possible. This allows a site to set cookies that then would get sent to
different and unrelated sites and domains.

It could do this by exploiting a mixed case flaw in curl's function that
verifies a given cookie domain against the Public Suffix List (PSL). For
example a cookie could be set with `domain=co.UK` when the URL used a lower
case hostname `curl.co.uk` even though `co.uk` is listed as a PSL domain.
</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-46218</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:ProductID>18234-16823</vuln:ProductID>
        <vuln:ProductID>17956-16823</vuln:ProductID>
        <vuln:ProductID>18235-16823</vuln:ProductID>
        <vuln:ProductID>17607-17084</vuln:ProductID>
        <vuln:ProductID>17734-17084</vuln:ProductID>
        <vuln:ProductID>17809-17084</vuln:ProductID>
        <vuln:ProductID>19690-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18234-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17956-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18235-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17607-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17809-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19690-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18234-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17956-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18235-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17607-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17809-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19690-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18234-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17956-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18235-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17607-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17809-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19690-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18234-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.0.35-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18234-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17956-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.21.4-13</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17956-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18235-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.5.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18235-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17607-17084</vuln:ProductID>
        <vuln:ProductID>19690-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.0.40-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17607-17084</vuln:ProductID>
        <vuln:ProductID>19690-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17734-17084</vuln:ProductID>
        <vuln:ProductID>17809-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.29.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17734-17084</vuln:ProductID>
        <vuln:ProductID>17809-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.4</cvrf:Number>
        <cvrf:Date>2024-11-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mysql to Azure Linux 3.0
Added cmake to Azure Linux 3.0
Added curl to CBL-Mariner 2.0
Added mysql to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.6</cvrf:Number>
        <cvrf:Date>2024-12-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mysql to Azure Linux 3.0
Added cmake to Azure Linux 3.0
Added cmake to CBL-Mariner 2.0
Added curl to CBL-Mariner 2.0
Added mysql to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.7</cvrf:Number>
        <cvrf:Date>2026-02-18T01:25:48</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-12-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mysql to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.2</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.3</cvrf:Number>
        <cvrf:Date>2024-10-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mysql to Azure Linux 3.0
Added cmake to Azure Linux 3.0
Added curl to CBL-Mariner 2.0
Added mysql to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.5</cvrf:Number>
        <cvrf:Date>2024-11-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added cmake to CBL-Mariner 2.0
Added curl to CBL-Mariner 2.0
Added mysql to CBL-Mariner 2.0
Added mysql to Azure Linux 3.0
Added cmake to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="11">
    <vuln:Title>The SSH transport protocol with certain OpenSSH extensions found in OpenSSH before 9.6 and other products allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message) and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP) implemented by these extensions mishandles the handshake phase and mishandles use of sequence numbers. For example there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT Dropbear through 2022.83 Ssh before 5.1.1 in Erlang/OTP PuTTY before 0.80 AsyncSSH before 2.14.2 golang.org/x/crypto before 0.17.0 libssh before 0.10.6 libssh2 </vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-48795</vuln:CVE>
    <vuln:CWE
      ID="CWE-354">Improper Validation of Integrity Check Value</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18085-17084</vuln:ProductID>
        <vuln:ProductID>19339-17084</vuln:ProductID>
        <vuln:ProductID>20073-17084</vuln:ProductID>
        <vuln:ProductID>19664-17084</vuln:ProductID>
        <vuln:ProductID>18199-16823</vuln:ProductID>
        <vuln:ProductID>18200-16823</vuln:ProductID>
        <vuln:ProductID>18201-16823</vuln:ProductID>
        <vuln:ProductID>18130-16823</vuln:ProductID>
        <vuln:ProductID>17414-16823</vuln:ProductID>
        <vuln:ProductID>18202-16823</vuln:ProductID>
        <vuln:ProductID>18203-16823</vuln:ProductID>
        <vuln:ProductID>18204-16823</vuln:ProductID>
        <vuln:ProductID>18205-16823</vuln:ProductID>
        <vuln:ProductID>18206-16823</vuln:ProductID>
        <vuln:ProductID>18207-16823</vuln:ProductID>
        <vuln:ProductID>18208-16823</vuln:ProductID>
        <vuln:ProductID>18209-16823</vuln:ProductID>
        <vuln:ProductID>18210-16823</vuln:ProductID>
        <vuln:ProductID>18211-17084</vuln:ProductID>
        <vuln:ProductID>17801-17084</vuln:ProductID>
        <vuln:ProductID>18041-17084</vuln:ProductID>
        <vuln:ProductID>18212-17084</vuln:ProductID>
        <vuln:ProductID>18213-17084</vuln:ProductID>
        <vuln:ProductID>18214-17084</vuln:ProductID>
        <vuln:ProductID>18215-17084</vuln:ProductID>
        <vuln:ProductID>17753-17084</vuln:ProductID>
        <vuln:ProductID>18216-17084</vuln:ProductID>
        <vuln:ProductID>18217-17084</vuln:ProductID>
        <vuln:ProductID>17766-17084</vuln:ProductID>
        <vuln:ProductID>19863-17084</vuln:ProductID>
        <vuln:ProductID>19605-17084</vuln:ProductID>
        <vuln:ProductID>19986-17084</vuln:ProductID>
        <vuln:ProductID>17793-17084</vuln:ProductID>
        <vuln:ProductID>17642-17084</vuln:ProductID>
        <vuln:ProductID>19453-17084</vuln:ProductID>
        <vuln:ProductID>19962-17084</vuln:ProductID>
        <vuln:ProductID>19808-17084</vuln:ProductID>
        <vuln:ProductID>18082-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18085-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19339-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20073-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19664-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18199-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18200-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18201-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18130-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17414-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18202-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18203-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18204-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18205-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18206-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18207-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18208-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18209-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18210-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18211-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17801-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18041-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18212-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18213-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18214-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18215-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17753-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18216-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18217-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17766-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19863-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19605-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19986-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17793-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17642-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19453-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19962-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19808-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18082-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18085-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19339-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20073-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19664-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18199-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18200-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18201-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18130-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17414-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18202-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18203-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18204-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18205-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18206-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18207-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18208-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18209-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18210-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18211-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17801-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18041-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18212-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18213-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18214-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18215-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17753-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18216-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18217-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17766-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19863-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19605-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19986-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17793-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17642-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19453-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19962-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19808-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18082-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18085-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19339-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>20073-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19664-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18199-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18200-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18201-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18130-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17414-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18202-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18203-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18204-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18205-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18206-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18207-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18208-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18209-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18210-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18211-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17801-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18041-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18212-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18213-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18214-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18215-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17753-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18216-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18217-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17766-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19863-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19605-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19986-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17793-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17642-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19453-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19962-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19808-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18082-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18085-17084</vuln:ProductID>
        <vuln:ProductID>18217-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.7.11-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18085-17084</vuln:ProductID>
        <vuln:ProductID>18217-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19339-17084</vuln:ProductID>
        <vuln:ProductID>18215-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.2.0-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19339-17084</vuln:ProductID>
        <vuln:ProductID>18215-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20073-17084</vuln:ProductID>
        <vuln:ProductID>18208-16823</vuln:ProductID>
        <vuln:ProductID>18214-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.10.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20073-17084</vuln:ProductID>
        <vuln:ProductID>18208-16823</vuln:ProductID>
        <vuln:ProductID>18214-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19664-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.29.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19664-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18199-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20.10.27-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18199-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18200-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.1.55-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18200-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18201-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.3.2-25</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18201-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18130-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.9.5-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18130-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17414-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.17.3-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17414-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18202-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20.10.27-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18202-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18203-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.59.0-26</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18203-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18204-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.28.4-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18204-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18205-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.9p1-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18205-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18206-16823</vuln:ProductID>
        <vuln:ProductID>18212-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.93-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18206-16823</vuln:ProductID>
        <vuln:ProductID>18212-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18207-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.9.0-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18207-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18209-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>25.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18209-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18210-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.11.2-7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18210-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18211-17084</vuln:ProductID>
        <vuln:ProductID>18082-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.8.20-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18211-17084</vuln:ProductID>
        <vuln:ProductID>18082-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17801-17084</vuln:ProductID>
        <vuln:ProductID>19808-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.14.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17801-17084</vuln:ProductID>
        <vuln:ProductID>19808-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18041-17084</vuln:ProductID>
        <vuln:ProductID>19962-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.9.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18041-17084</vuln:ProductID>
        <vuln:ProductID>19962-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18213-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.11.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18213-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17753-17084</vuln:ProductID>
        <vuln:ProductID>19986-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.30.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17753-17084</vuln:ProductID>
        <vuln:ProductID>19986-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18216-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>26.2.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18216-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17766-17084</vuln:ProductID>
        <vuln:ProductID>19863-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.12.12-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17766-17084</vuln:ProductID>
        <vuln:ProductID>19863-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19605-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>26.2.3-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19605-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19453-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19453-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-08-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.9</cvrf:Number>
        <cvrf:Date>2024-11-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kubevirt to Azure Linux 3.0
Added cert-manager to Azure Linux 3.0
Added packer to Azure Linux 3.0
Added kubernetes to Azure Linux 3.0
Added docker-buildx to Azure Linux 3.0
Added telegraf to Azure Linux 3.0
Added moby-compose to CBL-Mariner 2.0
Added packer to CBL-Mariner 2.0
Added kubernetes to CBL-Mariner 2.0
Added telegraf to CBL-Mariner 2.0
Added cert-manager to CBL-Mariner 2.0
Added erlang to CBL-Mariner 2.0
Added libssh2 to CBL-Mariner 2.0
Added moby-cli to CBL-Mariner 2.0
Added openssh to CBL-Mariner 2.0
Added libssh to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-03-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added cf-cli to Azure Linux 3.0
Added node-problem-detector to Azure Linux 3.0
Added kubevirt to Azure Linux 3.0
Added cert-manager to Azure Linux 3.0
Added packer to Azure Linux 3.0
Added kubernetes to Azure Linux 3.0
Added docker-buildx to Azure Linux 3.0
Added telegraf to Azure Linux 3.0
Added moby-compose to CBL-Mariner 2.0
Added packer to CBL-Mariner 2.0
Added kubernetes to CBL-Mariner 2.0
Added telegraf to CBL-Mariner 2.0
Added cert-manager to CBL-Mariner 2.0
Added erlang to CBL-Mariner 2.0
Added libssh2 to CBL-Mariner 2.0
Added moby-cli to CBL-Mariner 2.0
Added openssh to CBL-Mariner 2.0
Added libssh to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-12-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added moby-cli to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-08-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-08-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.6</cvrf:Number>
        <cvrf:Date>2024-08-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.7</cvrf:Number>
        <cvrf:Date>2024-08-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.8</cvrf:Number>
        <cvrf:Date>2024-08-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.9</cvrf:Number>
        <cvrf:Date>2024-08-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2024-08-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2024-09-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.2</cvrf:Number>
        <cvrf:Date>2024-09-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.3</cvrf:Number>
        <cvrf:Date>2024-09-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.4</cvrf:Number>
        <cvrf:Date>2024-09-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.5</cvrf:Number>
        <cvrf:Date>2024-09-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.6</cvrf:Number>
        <cvrf:Date>2024-09-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.7</cvrf:Number>
        <cvrf:Date>2024-09-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.8</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.1</cvrf:Number>
        <cvrf:Date>2025-03-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added libssh to Azure Linux 3.0
Added cf-cli to Azure Linux 3.0
Added node-problem-detector to Azure Linux 3.0
Added kubevirt to Azure Linux 3.0
Added cert-manager to Azure Linux 3.0
Added packer to Azure Linux 3.0
Added kubernetes to Azure Linux 3.0
Added docker-buildx to Azure Linux 3.0
Added telegraf to Azure Linux 3.0
Added moby-compose to CBL-Mariner 2.0
Added packer to CBL-Mariner 2.0
Added kubernetes to CBL-Mariner 2.0
Added telegraf to CBL-Mariner 2.0
Added cert-manager to CBL-Mariner 2.0
Added erlang to CBL-Mariner 2.0
Added libssh2 to CBL-Mariner 2.0
Added moby-cli to CBL-Mariner 2.0
Added openssh to CBL-Mariner 2.0
Added libssh to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.2</cvrf:Number>
        <cvrf:Date>2025-04-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kubevirt to CBL-Mariner 2.0
Added terraform to CBL-Mariner 2.0
Added moby-compose to CBL-Mariner 2.0
Added packer to CBL-Mariner 2.0
Added kubernetes to CBL-Mariner 2.0
Added telegraf to CBL-Mariner 2.0
Added cert-manager to CBL-Mariner 2.0
Added erlang to CBL-Mariner 2.0
Added libssh2 to CBL-Mariner 2.0
Added moby-cli to CBL-Mariner 2.0
Added openssh to CBL-Mariner 2.0
Added libssh to CBL-Mariner 2.0
Added libssh to Azure Linux 3.0
Added cf-cli to Azure Linux 3.0
Added node-problem-detector to Azure Linux 3.0
Added kubevirt to Azure Linux 3.0
Added cert-manager to Azure Linux 3.0
Added packer to Azure Linux 3.0
Added kubernetes to Azure Linux 3.0
Added docker-buildx to Azure Linux 3.0
Added telegraf to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.3</cvrf:Number>
        <cvrf:Date>2025-04-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added libssh2 to Azure Linux 3.0
Added libssh to Azure Linux 3.0
Added cf-cli to Azure Linux 3.0
Added node-problem-detector to Azure Linux 3.0
Added kubevirt to Azure Linux 3.0
Added cert-manager to Azure Linux 3.0
Added packer to Azure Linux 3.0
Added kubernetes to Azure Linux 3.0
Added docker-buildx to Azure Linux 3.0
Added telegraf to Azure Linux 3.0
Added kubevirt to CBL-Mariner 2.0
Added terraform to CBL-Mariner 2.0
Added moby-compose to CBL-Mariner 2.0
Added packer to CBL-Mariner 2.0
Added kubernetes to CBL-Mariner 2.0
Added telegraf to CBL-Mariner 2.0
Added cert-manager to CBL-Mariner 2.0
Added erlang to CBL-Mariner 2.0
Added libssh2 to CBL-Mariner 2.0
Added moby-cli to CBL-Mariner 2.0
Added openssh to CBL-Mariner 2.0
Added libssh to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.4</cvrf:Number>
        <cvrf:Date>2026-02-18T15:07:55</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="12">
    <vuln:Title>Command substitution output can trigger shell expansion in fish shell</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-49284</vuln:CVE>
    <vuln:CWE
      ID="CWE-436">Interpretation Conflict</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18240-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18240-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18240-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.6</vuln:BaseScore>
        <vuln:TemporalScore>6.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18240-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18240-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.6.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18240-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="14">
    <vuln:Title>Espeak-ng 1.52-dev was discovered to contain a buffer-overflow via the function SetUpPhonemeTable at synthdata.c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-49990</vuln:CVE>
    <vuln:CWE
      ID="CWE-120">Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.51.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="19">
    <vuln:Title>sec_attest_info in drivers/accel/habanalabs/common/habanalabs_ioctl.c in the Linux kernel through 6.6.5 allows an information leak to user space because info-&gt;pad0 is not initialized.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-50431</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16838-16823</vuln:ProductID>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16838-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16838-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>16838-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16838-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.153.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16838-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.12.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-22T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="20">
    <vuln:Title>cJSON v1.7.16 was discovered to contain a segmentation violation via the function cJSON_InsertItemInArray at cJSON.c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-50471</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16928-17084</vuln:ProductID>
        <vuln:ProductID>18223-16823</vuln:ProductID>
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:ProductID>19691-17086</vuln:ProductID>
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16928-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18223-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19691-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16928-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18223-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19691-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16928-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18223-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19691-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18223-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.0.4-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18223-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.2.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20442-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.1.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20442-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-19T01:16:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title>NCurse v6.4-20230418 was discovered to contain a segmentation fault via the component _nc_wrap_entry().</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="MITRE"
        Type="CNA"
        Ordinal="30">MITRE</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-50495</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18227-16823</vuln:ProductID>
        <vuln:ProductID>19855-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18227-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19855-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18227-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19855-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18227-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19855-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18227-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.4-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18227-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19855-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19855-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-12-07T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:13:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title>The jose2go component before 1.6.0 for Go allows attackers to cause a denial of service (CPU consumption) via a large p2c (aka PBES2 Count) value.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-50658</vuln:CVE>
    <vuln:CWE
      ID="CWE-770">Allocation of Resources Without Limits or Throttling</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20013-17086</vuln:ProductID>
        <vuln:ProductID>18163-16823</vuln:ProductID>
        <vuln:ProductID>18164-17084</vuln:ProductID>
        <vuln:ProductID>19664-17084</vuln:ProductID>
        <vuln:ProductID>17405-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20013-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18163-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18164-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19664-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17405-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>20013-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18163-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18164-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19664-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>17405-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20013-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18163-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18164-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19664-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17405-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20013-17086</vuln:ProductID>
        <vuln:ProductID>18163-16823</vuln:ProductID>
        <vuln:ProductID>18164-17084</vuln:ProductID>
        <vuln:ProductID>19664-17084</vuln:ProductID>
        <vuln:ProductID>17405-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.29.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20013-17086</vuln:ProductID>
        <vuln:ProductID>18163-16823</vuln:ProductID>
        <vuln:ProductID>18164-17084</vuln:ProductID>
        <vuln:ProductID>19664-17084</vuln:ProductID>
        <vuln:ProductID>17405-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-02-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2025-02-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added telegraf to CBL-Mariner 2.0
Added telegraf to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-20T23:09:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title>Ansible: malicious role archive can cause ansible-galaxy to overwrite arbitrary files</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-5115</vuln:CVE>
    <vuln:CWE
      ID="CWE-36">Absolute Path Traversal</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19716-17084</vuln:ProductID>
        <vuln:ProductID>18218-16823</vuln:ProductID>
        <vuln:ProductID>17822-17084</vuln:ProductID>
        <vuln:ProductID>19710-17086</vuln:ProductID>
        <vuln:ProductID>17445-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19716-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18218-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19710-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17445-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19716-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18218-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19710-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17445-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19716-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18218-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17822-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19710-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17445-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19716-17084</vuln:ProductID>
        <vuln:ProductID>17822-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.17.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19716-17084</vuln:ProductID>
        <vuln:ProductID>17822-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18218-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.14.11-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18218-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19710-17086</vuln:ProductID>
        <vuln:ProductID>17445-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.14.18-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19710-17086</vuln:ProductID>
        <vuln:ProductID>17445-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-07-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added ansible to CBL-Mariner 2.0
Added ansible to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-02-18T01:55:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="26">
    <vuln:Title>In ssh in OpenSSH before 9.6 OS command injection might occur if a user name or host name has shell metacharacters and this name is referenced by an expansion token in certain situations. For example an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-51385</vuln:CVE>
    <vuln:CWE
      ID="CWE-78">Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19897-17084</vuln:ProductID>
        <vuln:ProductID>18224-16823</vuln:ProductID>
        <vuln:ProductID>18225-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19897-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18224-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18225-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19897-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18224-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18225-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19897-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18224-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18225-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19897-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.7p1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19897-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18224-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.9p1-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18224-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18225-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18225-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-18T01:22:41</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title>An issue was discovered in the HTTP2 implementation in Qt before 5.15.17 6.x before 6.2.11 6.3.x through 6.5.x before 6.5.4 and 6.6.x before 6.6.2. network/access/http2/hpacktable.cpp has an incorrect HPack integer overflow check.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-51714</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19727-17086</vuln:ProductID>
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:ProductID>19089-17086</vuln:ProductID>
        <vuln:ProductID>18179-16823</vuln:ProductID>
        <vuln:ProductID>17680-17084</vuln:ProductID>
        <vuln:ProductID>19741-17084</vuln:ProductID>
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19727-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19089-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18179-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17680-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19741-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19727-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19089-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18179-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17680-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19741-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19727-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19089-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18179-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17680-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19741-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:ProductID>18179-16823</vuln:ProductID>
        <vuln:ProductID>17384-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:ProductID>18179-16823</vuln:ProductID>
        <vuln:ProductID>17384-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17680-17084</vuln:ProductID>
        <vuln:ProductID>19741-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17680-17084</vuln:ProductID>
        <vuln:ProductID>19741-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-01-21T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T01:58:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title>bt_sock_recvmsg in net/bluetooth/af_bluetooth.c in the Linux kernel through 6.6.8 has a use-after-free because of a bt_sock_ioctl race condition.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-51779</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17785-17084</vuln:ProductID>
        <vuln:ProductID>17748-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17785-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17748-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17785-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17748-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17785-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17748-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17785-17084</vuln:ProductID>
        <vuln:ProductID>17748-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.29.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17785-17084</vuln:ProductID>
        <vuln:ProductID>17748-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-20T23:38:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title>An issue was discovered in the Linux kernel before 6.6.8. do_vcc_ioctl in net/atm/ioctl.c has a use-after-free because of a vcc_recvmsg race condition.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-51780</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>17828-16823</vuln:ProductID>
        <vuln:ProductID>19874-17086</vuln:ProductID>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17828-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19874-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17828-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19874-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17828-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19874-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>17095-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.148.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>17095-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17828-16823</vuln:ProductID>
        <vuln:ProductID>19874-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.145.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17828-16823</vuln:ProductID>
        <vuln:ProductID>19874-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-01-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:18:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="32">
    <vuln:Title>An issue was discovered in the Linux kernel before 6.6.8. rose_ioctl in net/rose/af_rose.c has a use-after-free because of a rose_accept race condition.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-51782</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17095-17086</vuln:ProductID>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17095-17086</vuln:ProductID>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.148.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17095-17086</vuln:ProductID>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-01-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:52:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="33">
    <vuln:Title>Bytecode Alliance wasm-micro-runtime (aka WebAssembly Micro Runtime or WAMR) before 1.3.0 can have an "double free or corruption" error for a valid WebAssembly module because push_pop_frame_ref_offset is mishandled.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-52284</vuln:CVE>
    <vuln:CWE
      ID="CWE-415">Double Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19701-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19701-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19701-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19701-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19701-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.1.10-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19701-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:53:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-01-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title>Ansible: template injection</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-5764</vuln:CVE>
    <vuln:CWE
      ID="CWE-1336">Improper Neutralization of Special Elements Used in a Template Engine</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19716-17084</vuln:ProductID>
        <vuln:ProductID>17445-16823</vuln:ProductID>
        <vuln:ProductID>17822-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19716-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17445-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19716-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17445-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17822-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19716-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17445-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17822-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19716-17084</vuln:ProductID>
        <vuln:ProductID>17822-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.17.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19716-17084</vuln:ProductID>
        <vuln:ProductID>17822-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17445-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.14.12-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17445-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2026-02-18T14:56:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-21T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title>Postgresql: buffer overrun from integer overflow in array modification</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-5869</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18239-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18239-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18239-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18239-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18239-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.10-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18239-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title>Postgresql: role pg_signal_backend can signal certain superuser processes.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-5870</vuln:CVE>
    <vuln:CWE
      ID="CWE-400">Uncontrolled Resource Consumption</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19262-17084</vuln:ProductID>
        <vuln:ProductID>17174-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19262-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17174-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19262-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17174-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19262-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17174-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19262-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.3-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19262-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17174-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17174-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-11-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:28:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="39">
    <vuln:Title>Vault May be Vulnerable to a Denial of Service Through Memory Exhaustion When Handling Large HTTP Requests</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="HashiCorp"
        Type="CNA"
        Ordinal="30">HashiCorp</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6337</vuln:CVE>
    <vuln:CWE
      ID="CWE-770">Allocation of Resources Without Limits or Throttling</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17766-17084</vuln:ProductID>
        <vuln:ProductID>19817-17086</vuln:ProductID>
        <vuln:ProductID>19863-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17766-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19817-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19863-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17766-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19817-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19863-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17766-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19817-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19863-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17766-17084</vuln:ProductID>
        <vuln:ProductID>19863-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.12.12-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17766-17084</vuln:ProductID>
        <vuln:ProductID>19863-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:46:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title>Xorg-x11-server: out-of-bounds memory read in rrchangeoutputproperty and rrchangeproviderproperty</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6478</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18226-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18226-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18226-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18226-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18226-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.20.10-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18226-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-22T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="43">
    <vuln:Title>Kernel: gsm multiplexing race condition leads to privilege escalation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6546</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17452-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19673-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17095-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:ProductID>17095-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.148.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17452-16823</vuln:ProductID>
        <vuln:ProductID>19673-17086</vuln:ProductID>
        <vuln:ProductID>17095-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-01-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T01:56:22</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="44">
    <vuln:Title>Kernel: io_uring out of boundary memory access in __io_uaddr_map()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6560</vuln:CVE>
    <vuln:CWE
      ID="CWE-119">Improper Restriction of Operations within the Bounds of a Memory Buffer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16838-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16838-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>16838-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>16838-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16838-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.153.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>16838-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-22T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>Libssh: missing checks for return values for digests</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6918</vuln:CVE>
    <vuln:CWE
      ID="CWE-252">Unchecked Return Value</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20073-17084</vuln:ProductID>
        <vuln:ProductID>18208-16823</vuln:ProductID>
        <vuln:ProductID>18214-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20073-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18208-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18214-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>20073-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18208-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18214-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20073-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>18208-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>18214-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20073-17084</vuln:ProductID>
        <vuln:ProductID>18208-16823</vuln:ProductID>
        <vuln:ProductID>18214-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.10.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20073-17084</vuln:ProductID>
        <vuln:ProductID>18208-16823</vuln:ProductID>
        <vuln:ProductID>18214-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-03-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added libssh to Azure Linux 3.0
Added libssh to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-19T01:19:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>Use-after-free in Linux kernel's ipv4: igmp component</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Google"
        Type="CNA"
        Ordinal="30">Google</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6932</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18220-16823</vuln:ProductID>
        <vuln:ProductID>17062-17084</vuln:ProductID>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17062-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17062-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18220-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17062-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18220-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.143.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18220-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17062-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>-</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17062-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.29.1-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-19T01:11:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="53">
    <vuln:Title>SQLite SQLite3 make alltest sqlite3session.c sessionReadRecord heap-based overflow</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="VulDB"
        Type="CNA"
        Ordinal="30">VulDB</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-7104</vuln:CVE>
    <vuln:CWE
      ID="CWE-119">Improper Restriction of Operations within the Bounds of a Memory Buffer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19759-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19759-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19759-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19759-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19759-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.39.2-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19759-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:01:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-01-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title>Denial of service via chunk extensions in net/http</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Go"
        Type="CNA"
        Ordinal="30">Go</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-39326</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19718-17086</vuln:ProductID>
        <vuln:ProductID>18315-17084</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>19693-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
        <vuln:ProductID>18447-17086</vuln:ProductID>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:ProductID>18145-16823</vuln:ProductID>
        <vuln:ProductID>18146-16823</vuln:ProductID>
        <vuln:ProductID>19712-17086</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19718-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18447-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18145-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18146-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19718-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18447-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18145-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18146-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19718-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18447-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18145-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18146-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.21.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18145-16823</vuln:ProductID>
        <vuln:ProductID>18146-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.21.5-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18145-16823</vuln:ProductID>
        <vuln:ProductID>18146-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:35:43</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T03:09:08</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="4">
    <vuln:Title>Command 'go get' may unexpectedly fallback to insecure git in cmd/go</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Go"
        Type="CNA"
        Ordinal="30">Go</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-45285</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>19693-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:ProductID>18147-16823</vuln:ProductID>
        <vuln:ProductID>18315-17084</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18147-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18147-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18147-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.21.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18147-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.22.3-1.</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18147-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:31:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:51:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="15">
    <vuln:Title>Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Underflow via the function CountVowelPosition at synthdata.c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-49991</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.52.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:03:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="16">
    <vuln:Title>Espeak-ng 1.52-dev was discovered to contain a Stack Buffer Overflow via the function RemoveEnding at dictionary.c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-49992</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18420-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18421-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.52.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18420-17084</vuln:ProductID>
        <vuln:ProductID>18421-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:05:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>Systemd-resolved: unsigned name response in signed zone is not refused when dnssec=yes</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-7008</vuln:CVE>
    <vuln:CWE
      ID="CWE-300">Channel Accessible by Non-Endpoint</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19661-17086</vuln:ProductID>
        <vuln:ProductID>18413-17084</vuln:ProductID>
        <vuln:ProductID>19667-17086</vuln:ProductID>
        <vuln:ProductID>19687-17084</vuln:ProductID>
        <vuln:ProductID>19692-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19661-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18413-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19667-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19687-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19692-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19661-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18413-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19667-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19687-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19692-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19661-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18413-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19667-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19687-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19692-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19661-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>250.3-22</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19661-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18413-17084</vuln:ProductID>
        <vuln:ProductID>19692-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>255-20</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18413-17084</vuln:ProductID>
        <vuln:ProductID>19692-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19667-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>250.3-13</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19667-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19687-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>250.3-18</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19687-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:52:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver.  This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR &lt; 115.6, Thunderbird &lt; 115.6, and Firefox &lt; 121.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mozilla"
        Type="CNA"
        Ordinal="30">mozilla</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6856</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:46:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:54:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title>Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Cloud Files Mini Filter Driver"
        Type="Tag"
        Ordinal="20">Windows Cloud Files Mini Filter Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36696</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/ranchoice"&gt;RanchoIce&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title>Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, privileges required is low (PR:L).  What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The user would have to click on a specially crafted URL to be compromised by the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Dynamics"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36020</vuln:CVE>
    <vuln:CWE
      ID="CWE-79">Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11921</vuln:ProductID>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.6</vuln:BaseScore>
        <vuln:TemporalScore>6.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11921</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.6</vuln:BaseScore>
        <vuln:TemporalScore>6.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11664</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5032297</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=105717</vuln:URL>
        <vuln:ProductID>11921</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.1.23.10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5032298</vuln:Description>
        <vuln:URL>https://www.microsoft.com/en-us/download/details.aspx?id=105716</vuln:URL>
        <vuln:ProductID>11664</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.0.51.06</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://batr.am/"&gt;batram&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title>Microsoft Word Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A user needs to be tricked into running malicious files.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Word"
        Type="Tag"
        Ordinal="20">Microsoft Office Word</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36009</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.80.23121017</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002520</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=bda5c443-d654-4c9a-9a31-9f629661ad9a</vuln:URL>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5426.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002520</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=89300b5c-782a-4450-9781-31598ff82d40</vuln:URL>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5426.1000</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://erpaciocco.github.io/"&gt;ErPaciocco&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title>Win32k Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Win32K"
        Type="Tag"
        Ordinal="20">Windows Win32K</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36011</vuln:CVE>
    <vuln:CWE
      ID="CWE-822">Untrusted Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>guopengfei with QiAnXin Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="4">
    <vuln:Title>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is the severity for this CVE rated as Moderate, but the CVSS score is higher than normal?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.microsoft.com/en-us/msrc/bounty-new-edge"&gt;Per our severity guidelines&lt;/a&gt;, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity, specifically it says, &amp;quot;If a bug requires more than a click, a key press, or several preconditions, the severity will be downgraded&amp;quot;. The CVSS scoring system doesn't allow for this type of nuance.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could allow the attacker to gain the privileges needed to perform code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability could lead to a browser sandbox escape.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.61&lt;/td&gt;
&lt;td&gt;12/7/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.62/.63&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35618</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.6</vuln:BaseScore>
        <vuln:TemporalScore>8.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.61</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-07T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added FAQ to indicate the version numbers for this CVE. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title>Azure Machine Learning Compute Instance for SDK Users Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability enables data leakage only when a user's script is improperly used and triggers specific errors. The conditions required for triggering the error are not easily met making the complexity high.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Azure Machine Learning (ML) training data associated with user accounts will be disclosed. This data primarily consists of information used for ML model training purposes within the Azure ML system.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure Machine Learning"
        Type="Tag"
        Ordinal="20">Azure Machine Learning</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35625</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12266</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12266</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12266</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12266</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://pypi.org/project/mltable/1.5.0/</vuln:URL>
        <vuln:ProductID>12266</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.5.0</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Fei Deng</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title>Windows Media Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires that a user open a specially crafted file.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.&lt;/li&gt;
&lt;li&gt;In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Media"
        Type="Tag"
        Ordinal="20">Windows Media</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-21740</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/quangnh89"&gt;Nguyễn Hồng Quang (@quangnh89)&lt;/a&gt; with &lt;a href="https://viettelcybersecurity.com/"&gt;Viettel Cyber Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/tacbliw"&gt;L&amp;#234; Trần Hải T&amp;#249;ng (@tacbliw)&lt;/a&gt; with &lt;a href="https://viettelcybersecurity.com/"&gt;Viettel Cyber Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title>AMD: CVE-2023-20588 AMD Speculative Leaks Security Notice</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this AMD CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in certain processor models offered by AMD. The mitigation for this vulnerability requires a Windows update. This CVE is being documented in the Security Update Guide to announce that the latest builds of Windows enable the mitigation and provide protection against the vulnerability.&lt;/p&gt;
&lt;p&gt;Please see the following for more information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7007.html"&gt;AMD-SB-7007&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</vuln:Note>
      <vuln:Note
        Title="Chipsets"
        Type="Tag"
        Ordinal="20">Chipsets</vuln:Note>
      <vuln:Note
        Title="AMD"
        Type="CNA"
        Ordinal="30">AMD</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-20588</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="57">
    <vuln:Title>Chromium: CVE-2023-7024 Heap buffer overflow in WebRTC</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
&lt;p&gt;Google is aware that an exploit for CVE-2023-7024 exists in the wild.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.91&lt;/td&gt;
&lt;td&gt;12/21/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.130&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-7024</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.91</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-21T18:16:53</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="39">
    <vuln:Title>Microsoft Edge (Chromium-based) Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of this vulnerability only discloses limited information, no sensitive information can be obtained.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The user would have to click on a specially crafted URL to be compromised by the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.61&lt;/td&gt;
&lt;td&gt;12/7/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.62/.63&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-38174</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>3.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.61</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Josef Haji Karimian</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added FAQ to indicate the version numbers for this CVE. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-07T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title>Local Security Authority Subsystem Service Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Local Security Authority Subsystem Service (LSASS)"
        Type="Tag"
        Ordinal="20">Windows Local Security Authority Subsystem Service (LSASS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36391</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access ('Link Following')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/filip_dragovic"&gt;Filip Dragović&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="33">
    <vuln:Title>Microsoft Power Platform Connector Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The user would have to click on a specially crafted URL to be compromised by the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I know if my connector does not have a per-connector redirect URI?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Microsoft notified affected customers about this change in behavior via Microsoft 365 Admin Center (MC690931) or Service Health in the Azure Portal (3_SH-LTG) starting on November 17th, 2023. You will need to validate your custom connectors and follow the guidance to make the switch to the per-connector URI.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I know if a notification was sent to my organization?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Notifications were sent to customers via the Microsoft 365 Admin Center using a Data Privacy tag. This means that only users with a global administrator role or a Message center privacy reader role can view the notification. These roles are appointed by your organization. You can learn more about these roles and how to assign them at &lt;a href="https://azure.microsoft.com/en-us/blog/understanding-service-health-communications-for-azure-vulnerabilities/"&gt;https://azure.microsoft.com/en-us/blog/understanding-service-health-communications-for-azure-vulnerabilities/&lt;/a&gt;. If you are a Logic Apps customer, a notification was sent via Service Health in the Azure Portal under tracking ID 3_SH-LTG.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the nature of the spoofing?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could manipulate a malicious link, application, or file to disguise it as a legitimate link or file to trick the victim.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Power Platform Connector"
        Type="Tag"
        Ordinal="20">Microsoft Power Platform Connector</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36019</vuln:CVE>
    <vuln:CWE
      ID="CWE-73">External Control of File Name or Path</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12263</vuln:ProductID>
        <vuln:ProductID>12228</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12263</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12228</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12263</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12228</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.6</vuln:BaseScore>
        <vuln:TemporalScore>8.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12263</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.6</vuln:BaseScore>
        <vuln:TemporalScore>8.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12228</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/connectors/custom-connectors/#21-oauth-20</vuln:URL>
        <vuln:ProductID>12263</vuln:ProductID>
        <vuln:ProductID>12228</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.23113</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Mitigation">
        <vuln:Description>&lt;p&gt;&lt;strong&gt;The following mitigation has been applied to address this vulnerability:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;As of November 17, 2023, newly created custom connectors that use OAuth 2.0 to authenticate will automatically have a per connector redirect URI. Existing OAuth 2.0 connectors must be updated to use a per-connector redirect URI by February 19, 2024. Microsoft will start updating the custom connectors to use the per connector redirect URLs on February 19, 2024. Between February 19, 2024 - March 29, 2024, custom connectors without a per-connector redirect URI will gradually become deprecated. After March 29, 2024, users will no longer be able to create connections to or use existing OAuth 2.0 custom connectors that have not been updated. For more information see &lt;a href="https://learn.microsoft.com/en-us/connectors/custom-connectors/#21-oauth-20"&gt;https://learn.microsoft.com/en-us/connectors/custom-connectors/#21-oauth-20&lt;/a&gt;.&lt;/p&gt;
</vuln:Description>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Kaixuan Luo with Summer Intern @ Samsung Research America, PhD Student @ The Chinese University of Hong Kong</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Adonis Fung with Samsung Research America</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/sanebow"&gt;Xianbo Wang (@sanebow)&lt;/a&gt; with The Chinese University of Hong Kong</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Wing Cheong Lau with The Chinese University of Hong Kong</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-02-13T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated the mitigation to inform customers with existing OAuth 2.0 connectors that these connectors must be updated to use a per-connector redirect URI by March 29, 2024. After March 29, 2024, users will no longer be able to create connections to or use existing OAuth 2.0 custom connectors that have not been updated. For more information see &lt;a href="https://learn.microsoft.com/en-us/connectors/custom-connectors/#21-oauth-20"&gt;https://learn.microsoft.com/en-us/connectors/custom-connectors/#21-oauth-20&lt;/a&gt;. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-02-16T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added clarifying information to the mitigation. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title>Microsoft Defender Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Defender"
        Type="Tag"
        Ordinal="20">Windows Defender</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36010</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12183</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12183</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12183</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12183</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12183</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.18.23110.3</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Tomer Bar with &lt;a href="https://safebreach.com/"&gt;SafeBreach&lt;/a&gt; and Shmuel Cohen with &lt;a href="https://safebreach.com/"&gt;SafeBreach&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="32">
    <vuln:Title>DHCP Server Service Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability).&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows DHCP Server"
        Type="Tag"
        Ordinal="20">Windows DHCP Server</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36012</vuln:CVE>
    <vuln:CWE
      ID="CWE-908">Use of Uninitialized Resource</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="25">
    <vuln:Title>XAML Diagnostics Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authorized attacker with regular user privileges may be able to inject a malicious file and then convince a user to execute a UWP application.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="XAML Diagnostics"
        Type="Tag"
        Ordinal="20">XAML Diagnostics</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36003</vuln:CVE>
    <vuln:CWE
      ID="CWE-426">Untrusted Search Path</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/m417z"&gt;Michael Maltsev&lt;/a&gt; with &lt;a href="https://www.island.io/"&gt;Island&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="26">
    <vuln:Title>Windows DPAPI (Data Protection Application Programming Interface) Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthorized attacker must wait for a user to initiate a connection.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To exploit this vulnerability, an attacker would need to launch a machine-in-the-middle (MITM) attack against the traffic passing between a domain controller and the target machine.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows DPAPI (Data Protection Application Programming Interface)"
        Type="Tag"
        Ordinal="20">Windows DPAPI (Data Protection Application Programming Interface)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36004</vuln:CVE>
    <vuln:CWE
      ID="CWE-287">Improper Authentication</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Jeremy Asbury with &lt;a href="https://www.mandiant.com/"&gt;Mandiant&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/andrewoliveau"&gt;Andrew Oliveau&lt;/a&gt; with &lt;a href="https://www.mandiant.com/"&gt;Mandiant&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title>Windows Telephony Server Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could execute code in the security context of the “NT AUTHORITY\Network Service” account.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Telephony Server"
        Type="Tag"
        Ordinal="20">Windows Telephony Server</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36005</vuln:CVE>
    <vuln:CWE
      ID="CWE-591">Sensitive Data Storage in Improperly Locked Memory</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/keyz3r0"&gt;k0shl&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Kunlun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft WDAC OLE DB provider for SQL"
        Type="Tag"
        Ordinal="20">Microsoft WDAC OLE DB provider for SQL</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36006</vuln:CVE>
    <vuln:CWE
      ID="CWE-121">Stack-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=https://www.twitter.com/guhe120&gt;Yuki Chen&lt;/a&gt; with &lt;a href=https://www.cyberkl.com/&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=https://www.twitter.com/guhe120&gt;Yuki Chen&lt;/a&gt; with &lt;a href=https://www.cyberkl.com/&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=https://www.twitter.com/guhe120&gt;Yuki Chen&lt;/a&gt; with &lt;a href=https://www.cyberkl.com/&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=https://www.twitter.com/guhe120&gt;Yuki Chen&lt;/a&gt; with &lt;a href=https://www.cyberkl.com/&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=https://www.twitter.com/guhe120&gt;Yuki Chen&lt;/a&gt; with &lt;a href=https://www.cyberkl.com/&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=https://www.twitter.com/guhe120&gt;Yuki Chen&lt;/a&gt; with &lt;a href=https://www.cyberkl.com/&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=https://www.twitter.com/guhe120&gt;Yuki Chen&lt;/a&gt; with &lt;a href=https://www.cyberkl.com/&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=https://www.twitter.com/guhe120&gt;Yuki Chen&lt;/a&gt; with &lt;a href=https://www.cyberkl.com/&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href=https://www.twitter.com/guhe120&gt;Yuki Chen&lt;/a&gt; with &lt;a href=https://www.cyberkl.com/&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/20brokensp"&gt;Sam Pope&lt;/a&gt; with MSRC Vulnerabilities &amp;amp; Mitigations</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="19">
    <vuln:Title>DHCP Server Service Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows DHCP Server"
        Type="Tag"
        Ordinal="20">Windows DHCP Server</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35638</vuln:CVE>
    <vuln:CWE
      ID="CWE-126">Buffer Over-read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>YanZiShuang@BigCJTeam of cyberkl</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="20">
    <vuln:Title>Microsoft ODBC Driver Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authenticated victim who is connected to the network must be tricked or persuaded to connect to a malicious SQL database using their SQL client application. After the connection is made, the server can send specially crafted replies to the client that exploit the vulnerability and permit execution of arbitrary code within the context of the user's SQL client application.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could exploit the vulnerability by tricking an authenticated user (CVSS metric UI:R) into attempting to connect to a malicious SQL server via a connection driver (for example: ODBC and / or OLEDB as applicable).&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could exploit the vulnerability by tricking an authenticated user into attempting to connect to a malicious SQL server via OLEDB, which could result in the server receiving a malicious networking packet. This could allow the attacker to execute code remotely on the client.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows ODBC Driver"
        Type="Tag"
        Ordinal="20">Windows ODBC Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35639</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.twitter.com/guhe120"&gt;Yuki Chen&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="21">
    <vuln:Title>Internet Connection Sharing (ICS) Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To exploit this vulnerability, an attacker would need to send a maliciously crafted DHCP message to a server that runs the Internet Connection Sharing service.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Internet Connection Sharing (ICS)"
        Type="Tag"
        Ordinal="20">Windows Internet Connection Sharing (ICS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35641</vuln:CVE>
    <vuln:CWE
      ID="CWE-682">Incorrect Calculation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Mitigation">
        <vuln:Description>&lt;p&gt;The following &lt;a href="https://technet.microsoft.com/library/security/dn848375.aspx"&gt;mitigating factors&lt;/a&gt; might be helpful in your situation:&lt;/p&gt;
&lt;p&gt;Exploitation of this vulnerability requires that the Internet Connection Sharing (ICS) is enabled.&lt;/p&gt;
</vuln:Description>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/keyz3r0"&gt;k0shl&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Kunlun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Wei in Kunlun Lab with &lt;a href="https://www.cyberkl.com/"&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/keyz3r0"&gt;k0shl&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Kunlun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-12-13T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mitigation.  This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title>Internet Connection Sharing (ICS) Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Internet Connection Sharing (ICS)"
        Type="Tag"
        Ordinal="20">Windows Internet Connection Sharing (ICS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35642</vuln:CVE>
    <vuln:CWE
      ID="CWE-682">Incorrect Calculation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title>DHCP Server Service Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is remote heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows DHCP Server"
        Type="Tag"
        Ordinal="20">Windows DHCP Server</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35643</vuln:CVE>
    <vuln:CWE
      ID="CWE-126">Buffer Over-read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title>Windows Sysmain Service Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Kernel-Mode Drivers"
        Type="Tag"
        Ordinal="20">Windows Kernel-Mode Drivers</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35644</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/keyz3r0"&gt;k0shl&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Kunlun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title>Windows MSHTML Platform Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of this vulnerability requires that an attacker send a malicious link to the victim via email, or that they convince the user to click the link, typically by way of an enticement in an email or Instant Messenger message. In the worst-case email attack scenario, an attacker could send a specially crafted email to the user without a requirement that the victim open, read, or click on the link. This could result in the attacker executing remote code on the victim's machine. When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk (UI:N).&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS Metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability would rely upon complex memory shaping techniques to attempt an attack.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker could exploit this vulnerability by sending a specially crafted email which triggers automatically when it is retrieved and processed by the Outlook client. This could lead to exploitation BEFORE the email is viewed in the Preview Pane.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows MSHTML Platform"
        Type="Tag"
        Ordinal="20">Windows MSHTML Platform</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35628</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033376</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033376</vuln:URL>
        <vuln:Supercedence>5032191</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>IE Cumulative</vuln:SubType>
        <vuln:FixedBuild>1.001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033376</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033376</vuln:URL>
        <vuln:Supercedence>5032191</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>IE Cumulative</vuln:SubType>
        <vuln:FixedBuild>1.002</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/nachoskrnl"&gt;Ben Barnea&lt;/a&gt; with &lt;a href="https://www.akamai.com/"&gt;Akamai Technologies&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="11">
    <vuln:Title>Microsoft USBHUB 3.0 Device Driver Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows USB Mass Storage Class Driver"
        Type="Tag"
        Ordinal="20">Windows USB Mass Storage Class Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35629</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Wei in Kunlun Lab with &lt;a href="https://www.cyberkl.com/"&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="12">
    <vuln:Title>Internet Connection Sharing (ICS) Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS score, the attack vector is adjacent (AV:A). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack is limited to systems connected to the same network segment as the attacker. The attack cannot be performed across multiple networks (for example, a WAN) and would be limited to systems on the same network switch or virtual network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires the attacker to modify an option-&amp;gt;length field in a DHCPv6 DHCPV6_MESSAGE_INFORMATION_REQUEST input message.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Internet Connection Sharing (ICS)"
        Type="Tag"
        Ordinal="20">Windows Internet Connection Sharing (ICS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35630</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/keyz3r0"&gt;k0shl&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Kunlun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="13">
    <vuln:Title>Win32k Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Win32K"
        Type="Tag"
        Ordinal="20">Windows Win32K</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35631</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Offensive Research &amp;amp; Security Engineering</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="14">
    <vuln:Title>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Internet Connection Sharing (ICS)"
        Type="Tag"
        Ordinal="20">Windows Internet Connection Sharing (ICS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35632</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033372</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19041.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033372</vuln:URL>
        <vuln:Supercedence>5032189</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.3803</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Threat Intelligence
Microsoft Security Response Center</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="15">
    <vuln:Title>Windows Kernel Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Kernel"
        Type="Tag"
        Ordinal="20">Windows Kernel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35633</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access ('Link Following')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033379</vuln:URL>
        <vuln:Supercedence>5032199</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.20345</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Mateusz Jurczyk of &lt;a href="https://www.google.com"&gt;Google Project Zero&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="16">
    <vuln:Title>Windows Bluetooth Driver Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthorized attacker could exploit the Windows Bluetooth driver vulnerability by programmatically running certain functions that could lead to remote code execution on the Bluetooth component.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Bluetooth Driver"
        Type="Tag"
        Ordinal="20">Microsoft Bluetooth Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35634</vuln:CVE>
    <vuln:CWE
      ID="CWE-121">Stack-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033369</vuln:URL>
        <vuln:Supercedence>5032192</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.2652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033369</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033369</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Irwin Villalobos and Geoffrey Antos with Microsoft</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="17">
    <vuln:Title>Windows Kernel Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability could be exploited if an authenticated user opens a specially crafted file locally or browses to that file on a network share when running an unpatched version of Windows. When the user browses or lists the maliciously crafted file that action could cause a crash of the operating system.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Kernel"
        Type="Tag"
        Ordinal="20">Windows Kernel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35635</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.2861</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033375</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033375</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033375</vuln:URL>
        <vuln:Supercedence>5032190</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.2861</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/_l4ys"&gt;Shih-Fong Peng (@_L4ys)&lt;/a&gt; with &lt;a href="https://trapa.tw/"&gt;TRAPA Security&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="18">
    <vuln:Title>Microsoft Outlook Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires that a user open a specially crafted file.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.&lt;/li&gt;
&lt;li&gt;In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability could allow the disclosure of NTLM hashes.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Outlook"
        Type="Tag"
        Ordinal="20">Microsoft Office Outlook</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35636</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002529</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=c3eb9d94-5256-4ae0-b2da-8cbf2d451408</vuln:URL>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5426.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002529</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=c5890da5-b002-4ba2-85be-8e8b19b8504b</vuln:URL>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5426.1000</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Dolev Taler with &lt;a href="https://www.varonis.com/"&gt;Varonis&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title>Microsoft Outlook for Mac Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the nature of the spoofing?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could appear as a trusted user when they should not be. This could cause a user to mistakenly trust a signed email message as if it came from a legitimate user.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, Integrity (I:L) is Low. What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker who successfully exploits the vulnerability could inject CSS (Cascading Style Sheets) into an email, which is rendered at the victim’s side when they view the email.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Outlook"
        Type="Tag"
        Ordinal="20">Microsoft Office Outlook</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35619</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.80.23121017</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.linkedin.com/in/rme-infosec/"&gt;Ryan Emmons&lt;/a&gt; with &lt;a href="https://convergetp.com/cybersecurity/"&gt;Converge Technology Solutions&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="6">
    <vuln:Title>Microsoft Dynamics 365 Finance and Operations Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Dynamics"
        Type="Tag"
        Ordinal="20">Microsoft Dynamics</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35621</vuln:CVE>
    <vuln:CWE
      ID="CWE-799">Improper Control of Interaction Frequency</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12268</vuln:ProductID>
        <vuln:ProductID>12267</vuln:ProductID>
        <vuln:ProductID>12269</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12268</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12267</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12269</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12268</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12267</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12269</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12268</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12267</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12269</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/dynamics365/fin-ops-core/dev-itpro/migration-upgrade/download-hotfix-lcs</vuln:URL>
        <vuln:ProductID>12268</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.0.7120.46</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/dynamics365/fin-ops-core/dev-itpro/migration-upgrade/download-hotfix-lcs</vuln:URL>
        <vuln:ProductID>12267</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.0.7068.109</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/dynamics365/fin-ops-core/dev-itpro/migration-upgrade/download-hotfix-lcs</vuln:URL>
        <vuln:ProductID>12269</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.0.7036.133</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Andreas with &lt;a href="https://microsoft.com/"&gt;Microsoft&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="7">
    <vuln:Title>Windows DNS Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Microsoft Windows DNS"
        Type="Tag"
        Ordinal="20">Microsoft Windows DNS</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35622</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033371</vuln:URL>
        <vuln:Supercedence>5032196</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.5206</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033371</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033371</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033118</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033118</vuln:URL>
        <vuln:Supercedence>5032198</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2159</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033464</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033464</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.2144</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033383</vuln:URL>
        <vuln:Supercedence>5032202</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.584</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033373</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033373</vuln:URL>
        <vuln:Supercedence>5032197</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.6529</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033422</vuln:URL>
        <vuln:Supercedence>5032254</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033422</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033422</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22413</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033433</vuln:URL>
        <vuln:Supercedence>5032252</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033433</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033433</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26864</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5033424</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5033424</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033429</vuln:URL>
        <vuln:Supercedence>5032247</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24614</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5033420</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5033420</vuln:URL>
        <vuln:Supercedence>5032249</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.21715</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title>Azure Connected Machine Agent Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A non-admin local user who has sufficient permissions to create symbolic links on a Windows computer that has Azure Connected Machine Agent installed (or before the agent is installed) could create links from a directory used by the agent to other privileged files on the computer. If the administrator later installs virtual machine extensions on the machine, those files could be deleted.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could an attacker gain with successful exploitation?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited the vulnerability could add symlinks and cause an arbitrary file delete as SYSTEM.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure Connected Machine Agent"
        Type="Tag"
        Ordinal="20">Azure Connected Machine Agent</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-35624</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access ('Link Following')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12264</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12264</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12264</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12264</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-arc/servers/manage-agent?tabs=windows#upgrade-the-agent</vuln:URL>
        <vuln:ProductID>12264</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.37</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>R4nger &amp;amp; Zhiniang Peng</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-12T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title>Microsoft Edge (Chromium-based) Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of this vulnerability only discloses limited information, no sensitive information can be obtained.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker who successfully exploited the vulnerability could have limited ability to perform code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.61&lt;/td&gt;
&lt;td&gt;12/7/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.62/.63&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36880</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.61</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.chromium.org/"&gt;Alex Gough&lt;/a&gt; with Chrome Security Team</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added FAQ to indicate the version numbers for this CVE. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-07T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>Chromium: CVE-2023-6512 Inappropriate implementation in Web Browser UI</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.61&lt;/td&gt;
&lt;td&gt;12/7/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.62/.63&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6512</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.61</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-07T18:59:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>Chromium: CVE-2023-6511 Inappropriate implementation in Autofill</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.61&lt;/td&gt;
&lt;td&gt;12/7/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.62/.63&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6511</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.61</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-07T18:59:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title>Chromium: CVE-2023-6508 Use after free in Media Stream</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.61&lt;/td&gt;
&lt;td&gt;12/7/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.62/.63&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6508</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.61</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-07T18:58:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>Chromium: CVE-2023-6510 Use after free in Media Capture</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.61&lt;/td&gt;
&lt;td&gt;12/7/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.62/.63&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6510</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.61</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-07T18:59:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>Chromium: CVE-2023-6509 Use after free in Side Panel Search</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.61&lt;/td&gt;
&lt;td&gt;12/7/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.62/.63&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6509</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.61</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-07T18:59:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title>Azure DevOps Server Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric,privileges required is low(PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This means that an attacker needs to have a user account in the organization with the ability to run builds.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could impact the integrity(I:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation compromises the integrity of the build verification process, allowing an attacker to spoof and bypass verification.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure DevOps"
        Type="Tag"
        Ordinal="20">Azure DevOps</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-21751</vuln:CVE>
    <vuln:CWE
      ID="CWE-284">Improper Access Control</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12270</vuln:ProductID>
        <vuln:ProductID>12143</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12270</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12143</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12270</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12143</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12270</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12143</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>file://cpvsbuild/drops/mseng/tfs/Dev19/releases_M225.AzureDevOps2022.1/layouts/x86ret/Tfs2018Sgn_20231128.1/enu/devops/Patch</vuln:URL>
        <vuln:ProductID>12270</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20231128.1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12143</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20231127.4</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/agdosil"&gt;Anton Garcia Dosil&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-13T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published. This CVE was addressed by updates that were released in December 2023, but the CVE was inadvertently omitted from the December 2023 Security Updates. Microsoft strongly recommends that customers running affected versions of Azure DevOps Server install the December 2023 updates to be protected from this vulnerability.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>Chromium: CVE-2023-6702 Type Confusion in V8</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.77&lt;/td&gt;
&lt;td&gt;12/14/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.109&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6702</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.77</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="53">
    <vuln:Title>Chromium: CVE-2023-6704 Use after free in libavif</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.77&lt;/td&gt;
&lt;td&gt;12/14/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.109&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6704</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.77</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>Chromium: CVE-2023-6703 Use after free in Blink</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.77&lt;/td&gt;
&lt;td&gt;12/14/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.109&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6703</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.77</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="54">
    <vuln:Title>Chromium: CVE-2023-6705 Use after free in WebRTC</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.77&lt;/td&gt;
&lt;td&gt;12/14/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.109&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6705</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.77</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="55">
    <vuln:Title>Chromium: CVE-2023-6706 Use after free in FedCM</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.77&lt;/td&gt;
&lt;td&gt;12/14/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.109&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6706</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.77</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="56">
    <vuln:Title>Chromium: CVE-2023-6707 Use after free in CSS</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.77&lt;/td&gt;
&lt;td&gt;12/14/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.109&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-6707</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.77</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title>Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What kind of security feature could be bypassed by successfully exploiting this vulnerability?&lt;/strong&gt; The attacker would be able to bypass the protection in Edge that does not block &lt;code&gt;&amp;lt;img&amp;gt;&lt;/code&gt; tags which may contain blocked websites to be loaded. If an attacker successfully exploited this vulnerability it could load a malicious image file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.&lt;/p&gt;
&lt;p&gt;Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;120.0.2210.77&lt;/td&gt;
&lt;td&gt;12/14/2023&lt;/td&gt;
&lt;td&gt;120.0.6099.109&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-36878</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>3.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>120.0.2210.77</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.onecategory.com"&gt;Khiem Tran&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-14T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-48105</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-48105</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-48105</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>fluent-bit</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-2.1.10-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-devel-2.1.10-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-debuginfo-2.1.10-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.1.10-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>fluent-bit</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-2.1.10-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-devel-2.1.10-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-debuginfo-2.1.10-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.1.10-2</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-26592</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-26592</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-26592</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>reaper</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>reaper-3.1.1-9.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>3.1.1-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>reaper</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>3.1.1-9</vuln:FixedBuild>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-12-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
</cvrf:cvrfdoc>