<cvrf:cvrfdoc
  xmlns:vuln="http://www.icasi.org/CVRF/schema/vuln/1.1"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:cvrf-common="http://www.icasi.org/CVRF/schema/common/1.1"
  xmlns:prod="http://www.icasi.org/CVRF/schema/prod/1.1"
  xmlns:scap-core="https://scap.nist.gov/schema/scap-core/1.0"
  xmlns:cvssv2="https://scap.nist.gov/schema/cvss-v2/1.0"
  xmlns:cpe-lang="http://cpe.mitre.org/language/2.0"
  xmlns:sch="http://purl.oclc.org/dsdl/schematron"
  xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <cvrf:DocumentTitle>May 2023 Security Updates</cvrf:DocumentTitle>
  <cvrf:DocumentType>Security Update</cvrf:DocumentType>
  <cvrf:DocumentPublisher
    Type="Vendor">
    <cvrf:ContactDetails>secure@microsoft.com</cvrf:ContactDetails>
    <cvrf:IssuingAuthority>The Microsoft Security Response Center (MSRC) identifies, monitors, resolves, and responds to security incidents and Microsoft software security vulnerabilities. For more information, see http://www.microsoft.com/security/msrc.</cvrf:IssuingAuthority>
  </cvrf:DocumentPublisher>
  <cvrf:DocumentTracking>
    <cvrf:Identification>
      <cvrf:ID>2023-May</cvrf:ID>
      <cvrf:Alias>2023-May</cvrf:Alias>
    </cvrf:Identification>
    <cvrf:Status>Final</cvrf:Status>
    <cvrf:Version>1.0</cvrf:Version>
    <cvrf:RevisionHistory>
      <cvrf:Revision>
        <cvrf:Number>65</cvrf:Number>
        <cvrf:Date>2026-02-20T23:04:56</cvrf:Date>
        <cvrf:Description>May 2023 Security Updates</cvrf:Description>
      </cvrf:Revision>
    </cvrf:RevisionHistory>
    <cvrf:InitialReleaseDate>2023-05-09T07:00:00</cvrf:InitialReleaseDate>
    <cvrf:CurrentReleaseDate>2026-02-20T23:04:56</cvrf:CurrentReleaseDate>
  </cvrf:DocumentTracking>
  <cvrf:DocumentNotes>
    <cvrf:Note
      Title="Release Notes"
      Audience="Public"
      Type="Details"
      Ordinal="0">&lt;h2 id="this-release-consists-of-the-following-40-microsoft-cves"&gt;This release consists of the following 40 Microsoft CVEs:&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tag&lt;/th&gt;
&lt;th&gt;CVE&lt;/th&gt;
&lt;th&gt;Base Score&lt;/th&gt;
&lt;th&gt;CVSS Vector&lt;/th&gt;
&lt;th&gt;Exploitability&lt;/th&gt;
&lt;th&gt;FAQs?&lt;/th&gt;
&lt;th&gt;Workarounds?&lt;/th&gt;
&lt;th&gt;Mitigations?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Teams&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24881"&gt;CVE-2023-24881&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows SMB&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24898"&gt;CVE-2023-24898&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Graphics Component&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24899"&gt;CVE-2023-24899&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows NTLM&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24900"&gt;CVE-2023-24900&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.9&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows NFS Portmapper&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24901"&gt;CVE-2023-24901&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Win32K&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24902"&gt;CVE-2023-24902&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Secure Socket Tunneling Protocol (SSTP)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24903"&gt;CVE-2023-24903&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.1&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Installer&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24904"&gt;CVE-2023-24904&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.1&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Remote Desktop Client&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24905"&gt;CVE-2023-24905&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Secure Boot&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24932"&gt;CVE-2023-24932&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.2&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows NFS Portmapper&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24939"&gt;CVE-2023-24939&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Reliable Multicast Transport Driver (RMCAST)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24940"&gt;CVE-2023-24940&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Network File System&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24941"&gt;CVE-2023-24941&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;9.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Remote Procedure Call Runtime&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24942"&gt;CVE-2023-24942&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Reliable Multicast Transport Driver (RMCAST)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24943"&gt;CVE-2023-24943&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;9.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Bluetooth Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24944"&gt;CVE-2023-24944&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows iSCSI Target Service&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24945"&gt;CVE-2023-24945&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Backup Engine&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24946"&gt;CVE-2023-24946&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Bluetooth Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24947"&gt;CVE-2023-24947&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Bluetooth Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24948"&gt;CVE-2023-24948&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.4&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Kernel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24949"&gt;CVE-2023-24949&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office SharePoint&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24950"&gt;CVE-2023-24950&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24953"&gt;CVE-2023-24953&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office SharePoint&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24954"&gt;CVE-2023-24954&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office SharePoint&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-24955"&gt;CVE-2023-24955&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.2&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Secure Boot&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28251"&gt;CVE-2023-28251&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows LDAP - Lightweight Directory Access Protocol&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28283"&gt;CVE-2023-28283&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.1&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows RDP Client&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-28290"&gt;CVE-2023-28290&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows MSHTML Platform&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29324"&gt;CVE-2023-29324&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows OLE&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29325"&gt;CVE-2023-29325&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.1&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Access&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29333"&gt;CVE-2023-29333&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;3.3&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Word&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29335"&gt;CVE-2023-29335&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Win32K&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29336"&gt;CVE-2023-29336&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Detected&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Visual Studio Code&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29338"&gt;CVE-2023-29338&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Windows Codecs Library&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29340"&gt;CVE-2023-29340&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Windows Codecs Library&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29341"&gt;CVE-2023-29341&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SysInternals&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29343"&gt;CVE-2023-29343&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29344"&gt;CVE-2023-29344&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29350"&gt;CVE-2023-29350&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-29354"&gt;CVE-2023-29354&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;4.7&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="we-are-republishing-9-non-microsoft-cves"&gt;We are republishing 9 non-Microsoft CVEs:&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;CNA&lt;/th&gt;
&lt;th&gt;Tag&lt;/th&gt;
&lt;th&gt;CVE&lt;/th&gt;
&lt;th&gt;FAQs?&lt;/th&gt;
&lt;th&gt;Workarounds?&lt;/th&gt;
&lt;th&gt;Mitigations?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-2459"&gt;CVE-2023-2459&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-2460"&gt;CVE-2023-2460&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-2462"&gt;CVE-2023-2462&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-2463"&gt;CVE-2023-2463&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-2464"&gt;CVE-2023-2464&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-2465"&gt;CVE-2023-2465&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-2466"&gt;CVE-2023-2466&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-2467"&gt;CVE-2023-2467&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-2468"&gt;CVE-2023-2468&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="security-update-guide-blog-posts"&gt;Security Update Guide Blog Posts&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Date&lt;/th&gt;
&lt;th&gt;Blog Post&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;January 11, 2022&lt;/td&gt;
&lt;td&gt;&lt;a href="https://aka.ms/SUGNotificationProfile"&gt;Coming Soon: New Security Update Guide Notification System&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;February 9, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/02/09/continuing-to-listen-good-news-about-the-security-update-guide-api/"&gt;Continuing to Listen: Good News about the Security Update Guide API&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;January 13, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;December 8, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/12/08/security-update-guide-lets-keep-the-conversation-going/"&gt;Security Update Guide: Let’s keep the conversation going&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;November 9, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/11/09/vulnerability-descriptions-in-the-new-version-of-the-security-update-guide/"&gt;Vulnerability Descriptions in the New Version of the Security Update Guide&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="relevant-resources"&gt;Relevant Resources&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The new Hotpatching feature is now generally available. Please see &lt;a href="https://docs.microsoft.com/en-us/azure/automanage/automanage-hotpatch?WT.mc_id=modinfra-18529-thmaure"&gt;Hotpatching feature for Windows Server Azure Edition virtual machines (VMs)&lt;/a&gt; for more information.&lt;/li&gt;
&lt;li&gt;Windows 10 and Windows 11 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the &lt;a href="https://www.catalog.update.microsoft.com/Home.aspx"&gt;Microsoft Update Catalog&lt;/a&gt;. For information on lifecycle and support dates for Windows 10 operating systems, please see &lt;a href="https://docs.microsoft.com/en-us/lifecycle/faq/windows"&gt;Windows Lifecycle Facts Sheet&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Microsoft is improving Windows Release Notes. For more information, please see &lt;a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/what-s-next-for-windows-release-notes/ba-p/1754399"&gt;What's next for Windows release notes&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A list of the latest servicing stack updates for each operating system can be found in &lt;a href="https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV990001"&gt;ADV990001&lt;/a&gt;. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.&lt;/li&gt;
&lt;li&gt;In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.&lt;/li&gt;
&lt;li&gt;Customers running Windows 7, Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See &lt;a href="https://support.microsoft.com/en-us/topic/procedure-to-continue-receiving-security-updates-after-extended-support-ends-on-january-14-2020-48c59204-fe67-3f42-84fc-c3c3145ff28e"&gt;4522133&lt;/a&gt; for more information.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="known-issues"&gt;Known Issues&lt;/h2&gt;
&lt;p&gt;You can see these in more detail from the Deployments tab by selecting &lt;strong&gt;Known Issues&lt;/strong&gt; column in the &lt;strong&gt;Edit Columns&lt;/strong&gt; panel.&lt;/p&gt;
&lt;p&gt;For more information about Windows Known Issues, please see &lt;a href="https://docs.microsoft.com/en-us/windows/release-information/windows-message-center"&gt;Windows message center&lt;/a&gt; (links to currently-supported versions of Windows are in the left pane).&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;KB Article&lt;/th&gt;
&lt;th&gt;Applies To&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5026361"&gt;5026361&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, version 20H2, Windows 10, version 21H2, Windows 10, version 22H2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5026362"&gt;5026362&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, Version 1809, Windows Server 2019&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5026368"&gt;5026368&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 11 version 21H2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5026370"&gt;5026370&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2022&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5026372"&gt;5026372&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 11 version 22H2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5026408"&gt;5026408&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5026413"&gt;5026413&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 R2 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5026426"&gt;5026426&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 R2 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5026427"&gt;5026427&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</cvrf:Note>
    <cvrf:Note
      Title="Legal Disclaimer"
      Audience="Public"
      Type="Legal Disclaimer"
      Ordinal="1">The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.</cvrf:Note>
  </cvrf:DocumentNotes>
  <prod:ProductTree>
    <prod:Branch
      Type="Vendor"
      Name="Microsoft">
      <prod:Branch
        Type="Product Family"
        Name="Windows">
        <prod:FullProductName
          ProductID="11568">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11569">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11570">Windows 10 Version 1809 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11571">Windows Server 2019</prod:FullProductName>
        <prod:FullProductName
          ProductID="11572">Windows Server 2019 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11923">Windows Server 2022</prod:FullProductName>
        <prod:FullProductName
          ProductID="11924">Windows Server 2022 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11801">Windows 10 Version 20H2 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11802">Windows 10 Version 20H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11926">Windows 11 version 21H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11927">Windows 11 version 21H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11929">Windows 10 Version 21H2 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11930">Windows 10 Version 21H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11931">Windows 10 Version 21H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12085">Windows 11 Version 22H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12086">Windows 11 Version 22H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12097">Windows 10 Version 22H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12098">Windows 10 Version 22H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12099">Windows 10 Version 22H2 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10729">Windows 10 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10735">Windows 10 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10852">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10853">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10816">Windows Server 2016</prod:FullProductName>
        <prod:FullProductName
          ProductID="10855">Windows Server 2016 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11807">AV1 Video Extension</prod:FullProductName>
        <prod:FullProductName
          ProductID="11850">Microsoft Remote Desktop</prod:FullProductName>
        <prod:FullProductName
          ProductID="12437">Windows Server 2025 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="12389">Windows 11 Version 24H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12390">Windows 11 Version 24H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12436">Windows Server 2025</prod:FullProductName>
        <prod:FullProductName
          ProductID="12242">Windows 11 Version 23H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12243">Windows 11 Version 23H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12244">Windows Server 2022, 23H2 Edition (Server Core installation)</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="ESU">
        <prod:FullProductName
          ProductID="9312">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
        <prod:FullProductName
          ProductID="10287">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="9318">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
        <prod:FullProductName
          ProductID="9344">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10051">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10049">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10378">Windows Server 2012</prod:FullProductName>
        <prod:FullProductName
          ProductID="10379">Windows Server 2012 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10483">Windows Server 2012 R2</prod:FullProductName>
        <prod:FullProductName
          ProductID="10543">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Microsoft Office">
        <prod:FullProductName
          ProductID="10950">Microsoft SharePoint Enterprise Server 2016</prod:FullProductName>
        <prod:FullProductName
          ProductID="11585">Microsoft SharePoint Server 2019</prod:FullProductName>
        <prod:FullProductName
          ProductID="11961">Microsoft SharePoint Server Subscription Edition</prod:FullProductName>
        <prod:FullProductName
          ProductID="11573">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11574">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11575">Microsoft Office 2019 for Mac</prod:FullProductName>
        <prod:FullProductName
          ProductID="11605">Microsoft Office Online Server</prod:FullProductName>
        <prod:FullProductName
          ProductID="11762">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11763">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11951">Microsoft Office LTSC for Mac 2021</prod:FullProductName>
        <prod:FullProductName
          ProductID="11952">Microsoft Office LTSC 2021 for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11953">Microsoft Office LTSC 2021 for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="10739">Microsoft Excel 2016 (32-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10740">Microsoft Excel 2016 (64-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10656">Microsoft Excel 2013 RT Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10654">Microsoft Excel 2013 Service Pack 1 (32-bit editions)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10655">Microsoft Excel 2013 Service Pack 1 (64-bit editions)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10746">Microsoft Word 2016 (32-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10747">Microsoft Word 2016 (64-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10606">Microsoft Word 2013 RT Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10604">Microsoft Word 2013 Service Pack 1 (32-bit editions)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10605">Microsoft Word 2013 Service Pack 1 (64-bit editions)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11686">Microsoft Teams</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Developer Tools">
        <prod:FullProductName
          ProductID="11622">Visual Studio Code</prod:FullProductName>
        <prod:FullProductName
          ProductID="12114">Windows Sysmon</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Browser">
        <prod:FullProductName
          ProductID="11655">Microsoft Edge (Chromium-based)</prod:FullProductName>
        <prod:FullProductName
          ProductID="12142">Microsoft Edge (Chromium-based) Extended Stable</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Mariner">
        <prod:FullProductName
          ProductID="12137">CBL Mariner 1.0 x64</prod:FullProductName>
        <prod:FullProductName
          ProductID="12138">CBL Mariner 1.0 ARM</prod:FullProductName>
        <prod:FullProductName
          ProductID="12139">CBL Mariner 2.0 x64</prod:FullProductName>
        <prod:FullProductName
          ProductID="12140">CBL Mariner 2.0 ARM</prod:FullProductName>
      </prod:Branch>
    </prod:Branch>
    <prod:FullProductName
      ProductID="10049"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26519:*:*:*:*:*:x64:*">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10051"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.26519:*:*:*:*:*:x64:*">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10287"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22070:*:*:*:*:*:x64:*">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10378"
      CPE="cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24266:*:*:*:*:*:x64:*">Windows Server 2012</prod:FullProductName>
    <prod:FullProductName
      ProductID="10379"
      CPE="cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24266:*:*:*:*:*:x64:*">Windows Server 2012 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10483"
      CPE="cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20969:*:*:*:*:*:x64:*">Windows Server 2012 R2</prod:FullProductName>
    <prod:FullProductName
      ProductID="10543"
      CPE="cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.20969:*:*:*:*:*:x64:*">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10604"
      CPE="cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*">Microsoft Word 2013 Service Pack 1 (32-bit editions)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10605"
      CPE="cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*">Microsoft Word 2013 Service Pack 1 (64-bit editions)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10606"
      CPE="cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*">Microsoft Word 2013 RT Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10654"
      CPE="cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x86:*">Microsoft Excel 2013 Service Pack 1 (32-bit editions)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10655"
      CPE="cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:x64:*">Microsoft Excel 2013 Service Pack 1 (64-bit editions)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10656"
      CPE="cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*">Microsoft Excel 2013 RT Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10729"
      CPE="cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19926:*:*:*:*:*:x86:*">Windows 10 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10735"
      CPE="cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19926:*:*:*:*:*:x64:*">Windows 10 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10739"
      CPE="cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*">Microsoft Excel 2016 (32-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10740"
      CPE="cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*">Microsoft Excel 2016 (64-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10746"
      CPE="cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*">Microsoft Word 2016 (32-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10747"
      CPE="cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*">Microsoft Word 2016 (64-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10816"
      CPE="cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5921:*:*:*:*:*:*:*">Windows Server 2016</prod:FullProductName>
    <prod:FullProductName
      ProductID="10852"
      CPE="cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5921:*:*:*:*:*:x86:*">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10853"
      CPE="cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5921:*:*:*:*:*:x64:*">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10855"
      CPE="cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5921:*:*:*:*:*:*:*">Windows Server 2016 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10950"
      CPE="cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*">Microsoft SharePoint Enterprise Server 2016</prod:FullProductName>
    <prod:FullProductName
      ProductID="11568"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4377:*:*:*:*:*:x86:*">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11569"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4377:*:*:*:*:*:x64:*">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11570"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.4377:*:*:*:*:*:arm64:*">Windows 10 Version 1809 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11571"
      CPE="cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4377:*:*:*:*:*:*:*">Windows Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="11572"
      CPE="cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.4377:*:*:*:*:*:*:*">Windows Server 2019 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11573"
      CPE="cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11574"
      CPE="cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11575"
      CPE="cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*">Microsoft Office 2019 for Mac</prod:FullProductName>
    <prod:FullProductName
      ProductID="11585"
      CPE="cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*">Microsoft SharePoint Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="11605"
      CPE="cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*">Microsoft Office Online Server</prod:FullProductName>
    <prod:FullProductName
      ProductID="11622"
      CPE="cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*">Visual Studio Code</prod:FullProductName>
    <prod:FullProductName
      ProductID="11655"
      CPE="cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*">Microsoft Edge (Chromium-based)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11686"
      CPE="cpe:2.3:a:microsoft:teams:-:*:*:*:*:*:*:*">Microsoft Teams</prod:FullProductName>
    <prod:FullProductName
      ProductID="11762"
      CPE="cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11763"
      CPE="cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11801"
      CPE="cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.2965:*:*:*:*:*:x86:*">Windows 10 Version 20H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11802"
      CPE="cpe:2.3:o:microsoft:windows_10_20H2:10.0.19042.2965:*:*:*:*:*:arm64:*">Windows 10 Version 20H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11807"
      CPE="cpe:2.3:a:microsoft:av1_video_extension:1.1.51091.0:*:*:*:*:*:*:*">AV1 Video Extension</prod:FullProductName>
    <prod:FullProductName
      ProductID="11850"
      CPE="cpe:2.3:a:microsoft:remote_desktop:-:*:*:*:*:-:*:*">Microsoft Remote Desktop</prod:FullProductName>
    <prod:FullProductName
      ProductID="11923"
      CPE="cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1726:*:*:*:*:*:*:*">Windows Server 2022</prod:FullProductName>
    <prod:FullProductName
      ProductID="11924"
      CPE="cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1726:*:*:*:*:*:*:*">Windows Server 2022 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11926"
      CPE="cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.1936:*:*:*:*:*:x64:*">Windows 11 version 21H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11927"
      CPE="cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.1936:*:*:*:*:*:arm64:*">Windows 11 version 21H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11929"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.2965:*:*:*:*:*:x86:*">Windows 10 Version 21H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11930"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.2965:*:*:*:*:*:arm64:*">Windows 10 Version 21H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11931"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.2965:*:*:*:*:*:x64:*">Windows 10 Version 21H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11951"
      CPE="cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*">Microsoft Office LTSC for Mac 2021</prod:FullProductName>
    <prod:FullProductName
      ProductID="11952"
      CPE="cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*">Microsoft Office LTSC 2021 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11953"
      CPE="cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*">Microsoft Office LTSC 2021 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11961"
      CPE="cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*">Microsoft SharePoint Server Subscription Edition</prod:FullProductName>
    <prod:FullProductName
      ProductID="12085"
      CPE="cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.1702:*:*:*:*:*:arm64:*">Windows 11 Version 22H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12086"
      CPE="cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.1702:*:*:*:*:*:x64:*">Windows 11 Version 22H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12097"
      CPE="cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2965:*:*:*:*:*:x64:*">Windows 10 Version 22H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12098"
      CPE="cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2965:*:*:*:*:*:arm64:*">Windows 10 Version 22H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12099"
      CPE="cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.2965:*:*:*:*:*:x86:*">Windows 10 Version 22H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12114"
      CPE="cpe:2.3:a:microsoft:windows_sysmon:14.16:*:*:*:*:*:*:*">Windows Sysmon</prod:FullProductName>
    <prod:FullProductName
      ProductID="12137"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:x64">CBL Mariner 1.0 x64</prod:FullProductName>
    <prod:FullProductName
      ProductID="12138"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:1.0:*:*:*:*:*:*:arm">CBL Mariner 1.0 ARM</prod:FullProductName>
    <prod:FullProductName
      ProductID="12139"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:2.0:*:*:*:*:*:*:x64">CBL Mariner 2.0 x64</prod:FullProductName>
    <prod:FullProductName
      ProductID="12140"
      CPE="cpe:2.3:o:microsoft:cbl_mariner:2.0:*:*:*:*:*:*:arm">CBL Mariner 2.0 ARM</prod:FullProductName>
    <prod:FullProductName
      ProductID="12142"
      CPE="cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:extended_stable:*:*:*">Microsoft Edge (Chromium-based) Extended Stable</prod:FullProductName>
    <prod:FullProductName
      ProductID="12242"
      CPE="cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5624:*:*:*:*:*:arm64:*">Windows 11 Version 23H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12243"
      CPE="cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5624:*:*:*:*:*:x64:*">Windows 11 Version 23H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12244"
      CPE="cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1732:*:*:*:*:*:*:*">Windows Server 2022, 23H2 Edition (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="12389"
      CPE="cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.4652:*:*:*:*:*:arm64:*">Windows 11 Version 24H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12390"
      CPE="cpe:2.3:o:microsoft:windows_11_24H2:0.0.26200.4652:*:*:*:*:*:x64:*">Windows 11 Version 24H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12436"
      CPE="cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4652:*:*:*:*:*:*:*">Windows Server 2025</prod:FullProductName>
    <prod:FullProductName
      ProductID="12437"
      CPE="cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4652:*:*:*:*:*:*:*">Windows Server 2025 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="17012-17084"
      CPE="cpe:2.3:a:microsoft:azl3_shim-unsigned-x64_15.8-5:*:*:*:*:*:*:*:*">azl3 shim-unsigned-x64 15.8-5 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17013-17084"
      CPE="cpe:2.3:a:microsoft:azl3_shim-unsigned-aarch64_15.8-5:*:*:*:*:*:*:*:*">azl3 shim-unsigned-aarch64 15.8-5 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17093-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qemu_6.2.0-24:*:*:*:*:*:*:*:*">cbl2 qemu 6.2.0-24 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17374-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_hvloader_1.0.1-9:*:*:*:*:*:*:*:*">cbl2 hvloader 1.0.1-9 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17375-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.21.6-1:*:*:*:*:*:*:*:*">cbl2 golang 1.21.6-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17384-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-15:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-15 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17433-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_python-gevent_21.1.2-3:*:*:*:*:*:*:*:*">cbl2 python-gevent 21.1.2-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17485-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.23.7-1:*:*:*:*:*:*:*:*">azl3 golang 1.23.7-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17556-17084"
      CPE="cpe:2.3:a:microsoft:azl3_avahi_0.8-5:*:*:*:*:*:*:*:*">azl3 avahi 0.8-5 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17667-17084"
      CPE="cpe:2.3:a:microsoft:azl3_tensorflow_2.16.1-9:*:*:*:*:*:*:*:*">azl3 tensorflow 2.16.1-9 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17755-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libreswan_4.15-1:*:*:*:*:*:*:*:*">azl3 libreswan 4.15-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17823-16820"
      CPE="cpe:2.3:a:microsoft:cm1_kernel_5.10.188.1-1:*:*:*:*:*:*:*:*">cm1 kernel 5.10.188.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17824-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.122.1-2:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.122.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17835-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_hyperv-daemons_5.15.118.1-1:*:*:*:*:*:*:*:*">cbl2 hyperv-daemons 5.15.118.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17841-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.116.1-2:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.116.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17844-16820"
      CPE="cpe:2.3:a:microsoft:cm1_kernel_5.10.183.1-1:*:*:*:*:*:*:*:*">cm1 kernel 5.10.183.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17849-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.116.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.116.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17855-16820"
      CPE="cpe:2.3:a:microsoft:cm1_openssl_1.1.1k-16:*:*:*:*:*:*:*:*">cm1 openssl 1.1.1k-16 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17856-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_edk2_20230301gitf80f052277c8-37:*:*:*:*:*:*:*:*">cbl2 edk2 20230301gitf80f052277c8-37 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17857-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kata-containers-cc_0.4.1-2:*:*:*:*:*:*:*:*">cbl2 kata-containers-cc 0.4.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17858-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_openssl_1.1.1k-25:*:*:*:*:*:*:*:*">cbl2 openssl 1.1.1k-25 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17859-17084"
      CPE="cpe:2.3:a:microsoft:azl3_edk2_20230301gitf80f052277c8-37:*:*:*:*:*:*:*:*">azl3 edk2 20230301gitf80f052277c8-37 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17860-16820"
      CPE="cpe:2.3:a:microsoft:cm1_python-requests_2.22.0-3:*:*:*:*:*:*:*:*">cm1 python-requests 2.22.0-3 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17861-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_python-requests_2.27.1-6:*:*:*:*:*:*:*:*">cbl2 python-requests 2.27.1-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17862-16820"
      CPE="cpe:2.3:a:microsoft:cm1_c-ares_1.19.1-1:*:*:*:*:*:*:*:*">cm1 c-ares 1.19.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17863-16820"
      CPE="cpe:2.3:a:microsoft:cm1_kernel_5.10.181.1-1:*:*:*:*:*:*:*:*">cm1 kernel 5.10.181.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17864-16820"
      CPE="cpe:2.3:a:microsoft:cm1_qt5-qtbase_5.12.11-7:*:*:*:*:*:*:*:*">cm1 qt5-qtbase 5.12.11-7 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17865-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-8:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-8 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17866-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs18_18.17.1-2:*:*:*:*:*:*:*:*">cbl2 nodejs18 18.17.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17867-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs_16.20.1-2:*:*:*:*:*:*:*:*">cbl2 nodejs 16.20.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17868-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_grpc_1.42.0-11:*:*:*:*:*:*:*:*">cbl2 grpc 1.42.0-11 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17869-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_fluent-bit_2.1.10-1:*:*:*:*:*:*:*:*">cbl2 fluent-bit 2.1.10-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17870-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_c-ares_1.19.1-1:*:*:*:*:*:*:*:*">cbl2 c-ares 1.19.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17871-17084"
      CPE="cpe:2.3:a:microsoft:azl3_grpc_1.62.0-2:*:*:*:*:*:*:*:*">azl3 grpc 1.62.0-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17872-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_grpc_1.42.0-8:*:*:*:*:*:*:*:*">cbl2 grpc 1.42.0-8 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17873-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.112.1-2:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.112.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17874-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_grpc_1.42.0-10:*:*:*:*:*:*:*:*">cbl2 grpc 1.42.0-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17875-16820"
      CPE="cpe:2.3:a:microsoft:cm1_curl_7.88.1-2:*:*:*:*:*:*:*:*">cm1 curl 7.88.1-2 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17876-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_curl_8.0.1-2:*:*:*:*:*:*:*:*">cbl2 curl 8.0.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17877-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_cmake_3.21.4-6:*:*:*:*:*:*:*:*">cbl2 cmake 3.21.4-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17878-17084"
      CPE="cpe:2.3:a:microsoft:azl3_tensorflow_2.16.1-1:*:*:*:*:*:*:*:*">azl3 tensorflow 2.16.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17879-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cmake_3.21.4-10:*:*:*:*:*:*:*:*">azl3 cmake 3.21.4-10 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17880-16820"
      CPE="cpe:2.3:a:microsoft:cm1_libtiff_4.5.0-3:*:*:*:*:*:*:*:*">cm1 libtiff 4.5.0-3 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17881-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libtiff_4.5.0-3:*:*:*:*:*:*:*:*">cbl2 libtiff 4.5.0-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17882-16820"
      CPE="cpe:2.3:a:microsoft:cm1_vim_9.0.1562-1:*:*:*:*:*:*:*:*">cm1 vim 9.0.1562-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17883-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_vim_9.0.1562-1:*:*:*:*:*:*:*:*">cbl2 vim 9.0.1562-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17884-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.112.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.112.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17885-16820"
      CPE="cpe:2.3:a:microsoft:cm1_hyperv-daemons_5.10.179.1-1:*:*:*:*:*:*:*:*">cm1 hyperv-daemons 5.10.179.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17886-16820"
      CPE="cpe:2.3:a:microsoft:cm1_qt5-qtsvg_5.12.11-4:*:*:*:*:*:*:*:*">cm1 qt5-qtsvg 5.12.11-4 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17887-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtsvg_5.15.9-1:*:*:*:*:*:*:*:*">cbl2 qt5-qtsvg 5.15.9-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17889-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.111.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.111.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17890-16820"
      CPE="cpe:2.3:a:microsoft:cm1_yasm_1.3.0-14:*:*:*:*:*:*:*:*">cm1 yasm 1.3.0-14 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17891-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_yasm_1.3.0-14:*:*:*:*:*:*:*:*">cbl2 yasm 1.3.0-14 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17892-17084"
      CPE="cpe:2.3:a:microsoft:azl3_yasm_1.3.0-14:*:*:*:*:*:*:*:*">azl3 yasm 1.3.0-14 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17893-16820"
      CPE="cpe:2.3:a:microsoft:cm1_kernel_5.10.179.1-1:*:*:*:*:*:*:*:*">cm1 kernel 5.10.179.1-1 on CBL Mariner 1.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17953-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_rust_1.72.0-2:*:*:*:*:*:*:*:*">cbl2 rust 1.72.0-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17957-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cmake_3.28.2-1:*:*:*:*:*:*:*:*">azl3 cmake 3.28.2-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18136-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_msft-golang_1.20.11-1:*:*:*:*:*:*:*:*">cbl2 msft-golang 1.20.11-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18138-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.20.7-1:*:*:*:*:*:*:*:*">cbl2 golang 1.20.7-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18140-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_msft-golang_1.20.7-1:*:*:*:*:*:*:*:*">cbl2 msft-golang 1.20.7-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18141-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.20.7-1:*:*:*:*:*:*:*:*">azl3 golang 1.20.7-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18287-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_mysql_8.0.34-1:*:*:*:*:*:*:*:*">cbl2 mysql 8.0.34-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18295-17084"
      CPE="cpe:2.3:a:microsoft:azl3_tensorflow_2.11.1-1:*:*:*:*:*:*:*:*">azl3 tensorflow 2.11.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18315-17084"
      CPE="cpe:2.3:a:microsoft:azl3_gcc_13.2.0-7:*:*:*:*:*:*:*:*">azl3 gcc 13.2.0-7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18333-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-9:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-9 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18337-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_curl_8.2.1-1:*:*:*:*:*:*:*:*">cbl2 curl 8.2.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18356-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_openldap_2.4.57-9:*:*:*:*:*:*:*:*">cbl2 openldap 2.4.57-9 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18357-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_skopeo_1.12.0-3:*:*:*:*:*:*:*:*">cbl2 skopeo 1.12.0-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18358-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libreswan_4.14-1:*:*:*:*:*:*:*:*">cbl2 libreswan 4.14-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18359-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_cmake_3.21.4-11:*:*:*:*:*:*:*:*">cbl2 cmake 3.21.4-11 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18360-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_avahi_0.8-2:*:*:*:*:*:*:*:*">cbl2 avahi 0.8-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18361-17084"
      CPE="cpe:2.3:a:microsoft:azl3_avahi_0.8-3:*:*:*:*:*:*:*:*">azl3 avahi 0.8-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18362-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_sysstat_12.7.1-2:*:*:*:*:*:*:*:*">cbl2 sysstat 12.7.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18365-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_binutils_2.37-10:*:*:*:*:*:*:*:*">cbl2 binutils 2.37-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18366-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libvirt_7.10.0-5:*:*:*:*:*:*:*:*">cbl2 libvirt 7.10.0-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18367-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libvirt_7.10.0-5:*:*:*:*:*:*:*:*">azl3 libvirt 7.10.0-5 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18371-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_frr_8.5.1-2:*:*:*:*:*:*:*:*">cbl2 frr 8.5.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18372-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_vitess_16.0.2-1:*:*:*:*:*:*:*:*">cbl2 vitess 16.0.2-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18373-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_rust_1.72.0-1:*:*:*:*:*:*:*:*">cbl2 rust 1.72.0-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18374-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_clang16_16.0.0-2:*:*:*:*:*:*:*:*">cbl2 clang16 16.0.0-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18375-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_etcd_3.5.3-10:*:*:*:*:*:*:*:*">cbl2 etcd 3.5.3-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18376-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_llvm_12.0.1-8:*:*:*:*:*:*:*:*">cbl2 llvm 12.0.1-8 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18377-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_llvm16_16.0.0-4:*:*:*:*:*:*:*:*">cbl2 llvm16 16.0.0-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18411-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-tornado_6.3.3-11:*:*:*:*:*:*:*:*">azl3 python-tornado 6.3.3-11 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18417-17084"
      CPE="cpe:2.3:a:microsoft:azl3_yasm_1.3.0-16:*:*:*:*:*:*:*:*">azl3 yasm 1.3.0-16 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18469-17084"
      CPE="cpe:2.3:a:microsoft:azl3_mozjs_102.15.1-1:*:*:*:*:*:*:*:*">azl3 mozjs 102.15.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19662-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qemu_6.2.0-24:*:*:*:*:*:*:*:*">cbl2 qemu 6.2.0-24 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19666-17084"
      CPE="cpe:2.3:a:microsoft:azl3_ceph_18.2.2-8:*:*:*:*:*:*:*:*">azl3 ceph 18.2.2-8 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19668-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_tensorflow_2.11.1-2:*:*:*:*:*:*:*:*">cbl2 tensorflow 2.11.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19671-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.75.0-14:*:*:*:*:*:*:*:*">azl3 rust 1.75.0-14 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19678-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_hvloader_1.0.1-11:*:*:*:*:*:*:*:*">cbl2 hvloader 1.0.1-11 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19679-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.23.9-1:*:*:*:*:*:*:*:*">azl3 golang 1.23.9-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19686-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.86.0-1:*:*:*:*:*:*:*:*">azl3 rust 1.86.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19693-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-tensorboard_2.16.2-6:*:*:*:*:*:*:*:*">azl3 python-tensorboard 2.16.2-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19697-17084"
      CPE="cpe:2.3:a:microsoft:azl3_golang_1.24.3-1:*:*:*:*:*:*:*:*">azl3 golang 1.24.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19712-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_python-tensorboard_2.11.0-3:*:*:*:*:*:*:*:*">cbl2 python-tensorboard 2.11.0-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19737-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_qt5-qtbase_5.12.11-15:*:*:*:*:*:*:*:*">cbl2 qt5-qtbase 5.12.11-15 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19746-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rubygem-mini_portile2_2.8.4-1:*:*:*:*:*:*:*:*">azl3 rubygem-mini_portile2 2.8.4-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19778-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.17.13-2:*:*:*:*:*:*:*:*">cbl2 golang 1.17.13-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19785-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_golang_1.18.8-7:*:*:*:*:*:*:*:*">cbl2 golang 1.18.8-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19814-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_ceph_16.2.10-7:*:*:*:*:*:*:*:*">cbl2 ceph 16.2.10-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19899-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libreswan_4.7-7:*:*:*:*:*:*:*:*">azl3 libreswan 4.7-7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20279-17084"
      CPE="cpe:2.3:a:microsoft:azl3_grpc_1.42.0-7:*:*:*:*:*:*:*:*">azl3 grpc 1.42.0-7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20744-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.75.0-22:*:*:*:*:*:*:*:*">azl3 rust 1.75.0-22 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20822-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.90.0-1:*:*:*:*:*:*:*:*">azl3 rust 1.90.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20865-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.90.0-3:*:*:*:*:*:*:*:*">azl3 rust 1.90.0-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="9312"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22070:*:*:*:*:*:x64:*">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9318"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22070:*:*:*:*:*:x86:*">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9344"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22070:*:*:*:*:*:x86:*">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
  </prod:ProductTree>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title>A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server-&gt;hostname to NULL leading to an invalid pointer request.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1195</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17873-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.112.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17873-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title>A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem possibly leading to a kernel information leak.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1859</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:ProductID>17841-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17841-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17841-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17841-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17841-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.116.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17841-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title>A vulnerability was found in the avahi library. This flaw allows an unprivileged user to make a dbus call causing the avahi daemon to crash.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1981</vuln:CVE>
    <vuln:CWE
      ID="CWE-400">Uncontrolled Resource Consumption</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17556-17084</vuln:ProductID>
        <vuln:ProductID>18360-16823</vuln:ProductID>
        <vuln:ProductID>18361-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17556-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18360-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18361-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17556-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18360-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18361-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17556-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18360-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18361-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17556-17084</vuln:ProductID>
        <vuln:ProductID>18361-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.8-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17556-17084</vuln:ProductID>
        <vuln:ProductID>18361-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18360-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.8-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18360-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-11-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-18T15:01:30</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-12-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added avahi to CBL-Mariner 2.0
Added avahi to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="6">
    <vuln:Title>A vulnerability was found in the HCI sockets implementation due to a missing capability check in net/bluetooth/hci_sock.c in the Linux Kernel. This flaw allows an attacker to unauthorized execution of management commands compromising the confidentiality integrity and availability of Bluetooth communication.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2002</vuln:CVE>
    <vuln:CWE
      ID="CWE-863">Incorrect Authorization</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17841-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17841-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17841-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</vuln:Vector>
        <vuln:ProductID>17841-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17841-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.116.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17841-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-06-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-07-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title>Use-after-free in Linux kernel's Performance Events subsystem</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Google"
        Type="CNA"
        Ordinal="30">Google</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2235</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17889-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17889-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17889-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17889-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17889-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17889-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="13">
    <vuln:Title>A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2513</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:ProductID>17885-16820</vuln:ProductID>
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17885-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17885-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17885-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17885-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17885-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17884-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.112.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17884-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="16">
    <vuln:Title>Possible DoS translating ASN.1 object identifiers</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="openssl"
        Type="CNA"
        Ordinal="30">openssl</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2650</vuln:CVE>
    <vuln:CWE
      ID="CWE-770">Allocation of Resources Without Limits or Throttling</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19678-17086</vuln:ProductID>
        <vuln:ProductID>19662-17086</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>17855-16820</vuln:ProductID>
        <vuln:ProductID>17374-16823</vuln:ProductID>
        <vuln:ProductID>17856-16823</vuln:ProductID>
        <vuln:ProductID>17857-16823</vuln:ProductID>
        <vuln:ProductID>17858-16823</vuln:ProductID>
        <vuln:ProductID>17859-17084</vuln:ProductID>
        <vuln:ProductID>17013-17084</vuln:ProductID>
        <vuln:ProductID>17012-17084</vuln:ProductID>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19678-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17855-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17374-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17856-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17857-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17858-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17859-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17013-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17012-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19678-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17855-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17374-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17856-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17857-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17858-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17859-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17013-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17012-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19678-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17855-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17374-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17856-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17857-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17858-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17859-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17013-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17012-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19678-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.1-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19678-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17855-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.1.1k-16</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17855-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.1-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17856-16823</vuln:ProductID>
        <vuln:ProductID>17859-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20230301gitf80f052277c8-37</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17856-16823</vuln:ProductID>
        <vuln:ProductID>17859-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17857-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.4.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17857-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17858-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.1.1k-25</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17858-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-06-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added rust to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-10-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added edk2 to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-04-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added hvloader to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.5</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T01:49:13</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="18">
    <vuln:Title>A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file resulting in a program crash or denial of service.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2731</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17880-16820</vuln:ProductID>
        <vuln:ProductID>17881-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17880-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17881-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17880-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17881-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17880-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17881-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17880-16820</vuln:ProductID>
        <vuln:ProductID>17881-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.5.0-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17880-16820</vuln:ProductID>
        <vuln:ProductID>17881-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="19">
    <vuln:Title>A use after free vulnerability exists in curl &lt;v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28319</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:ProductID>18287-16823</vuln:ProductID>
        <vuln:ProductID>18337-16823</vuln:ProductID>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18287-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18337-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18287-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18337-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18287-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18337-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.72.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18287-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.0.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18287-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18337-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18337-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-18T15:16:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="20">
    <vuln:Title>A denial of service vulnerability exists in curl &lt;v8.1.0 in the way libcurl provides several different backends for resolving host names selected at build time. If it is built to use the synchronous resolver it allows name resolves to time-out slow operations using `alarm()` and `siglongjmp()`. When doing this libcurl used a global buffer that was not mutex protected and a multi-threaded application might therefore crash or otherwise misbehave.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28320</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:ProductID>18287-16823</vuln:ProductID>
        <vuln:ProductID>18337-16823</vuln:ProductID>
        <vuln:ProductID>18359-16823</vuln:ProductID>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>17957-17084</vuln:ProductID>
        <vuln:ProductID>17879-17084</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18287-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18337-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18359-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17957-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17879-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18287-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18337-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18359-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17957-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17879-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18287-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18337-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18359-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17957-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17879-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.72.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18287-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.0.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18287-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18337-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18337-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18359-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.21.4-11</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18359-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17957-17084</vuln:ProductID>
        <vuln:ProductID>17879-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.28.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17957-17084</vuln:ProductID>
        <vuln:ProductID>17879-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-08-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2026-02-18T01:06:44</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title>llvm-project commit a0138390 was discovered to contain a segmentation fault via the component matchAndRewriteSortOp&lt;mlir::sparse_tensor::SortOp&gt;(mlir::sparse_tensor::SortOp.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29941</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>18377-16823</vuln:ProductID>
        <vuln:ProductID>18374-16823</vuln:ProductID>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18377-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18377-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18377-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18377-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.0-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18377-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-03-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added llvm16 to CBL-Mariner 2.0
Added tensorflow to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2025-03-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added clang16 to CBL-Mariner 2.0
Added llvm16 to CBL-Mariner 2.0
Added tensorflow to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2026-02-18T14:15:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title>Insufficient randomness in generation of DNS query IDs in c-ares</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-31147</vuln:CVE>
    <vuln:CWE
      ID="CWE-330">Use of Insufficiently Random Values</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20279-17084</vuln:ProductID>
        <vuln:ProductID>19746-17084</vuln:ProductID>
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:ProductID>17866-16823</vuln:ProductID>
        <vuln:ProductID>17867-16823</vuln:ProductID>
        <vuln:ProductID>17874-16823</vuln:ProductID>
        <vuln:ProductID>17869-16823</vuln:ProductID>
        <vuln:ProductID>17870-16823</vuln:ProductID>
        <vuln:ProductID>17871-17084</vuln:ProductID>
        <vuln:ProductID>19814-17086</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20279-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19746-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17866-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17867-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17874-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17869-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17870-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17871-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19814-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20279-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19746-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17866-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17867-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17874-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17869-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17870-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17871-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19814-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>20279-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19746-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17866-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17867-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17874-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17869-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17870-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17871-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19814-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20279-17084</vuln:ProductID>
        <vuln:ProductID>17871-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.62.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20279-17084</vuln:ProductID>
        <vuln:ProductID>17871-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.2.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:ProductID>17870-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.19.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:ProductID>17870-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>21.1.2-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17866-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.17.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17866-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17867-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.20.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17867-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17874-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.42.0-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17874-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17869-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.1.10-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17869-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2026-02-18T03:14:44</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2025-03-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added grpc to CBL-Mariner 2.0
Added fluent-bit to CBL-Mariner 2.0
Added nodejs18 to CBL-Mariner 2.0
Added nodejs to CBL-Mariner 2.0
Added c-ares to CBL-Mariner 2.0
Added grpc to Azure Linux 3.0
Added c-ares to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title>An issue found in Frrouting bgpd v.8.4.2 allows a remote attacker to cause a denial of service via the bgp_attr_psid_sub() function.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-31490</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18371-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18371-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18371-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18371-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18371-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.5.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18371-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title>yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-31975</vuln:CVE>
    <vuln:CWE
      ID="CWE-401">Missing Release of Memory after Effective Lifetime</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18417-17084</vuln:ProductID>
        <vuln:ProductID>17890-16820</vuln:ProductID>
        <vuln:ProductID>17891-16823</vuln:ProductID>
        <vuln:ProductID>17892-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18417-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17890-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17891-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17892-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>18417-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>17890-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>17891-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>17892-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>18417-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>17890-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>17891-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>17892-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18417-17084</vuln:ProductID>
        <vuln:ProductID>17890-16820</vuln:ProductID>
        <vuln:ProductID>17891-16823</vuln:ProductID>
        <vuln:ProductID>17892-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.3.0-14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18417-17084</vuln:ProductID>
        <vuln:ProductID>17890-16820</vuln:ProductID>
        <vuln:ProductID>17891-16823</vuln:ProductID>
        <vuln:ProductID>17892-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-20T23:04:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="44">
    <vuln:Title>In Qt before 5.15.14 6.0.x through 6.2.x before 6.2.9 and 6.3.x through 6.5.x before 6.5.1 QtSvg QSvgFont m_unitsPerEm initialization is mishandled.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-32573</vuln:CVE>
    <vuln:CWE
      ID="CWE-369">Divide By Zero</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17384-17086</vuln:ProductID>
        <vuln:ProductID>17886-16820</vuln:ProductID>
        <vuln:ProductID>17887-16823</vuln:ProductID>
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17886-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17887-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17886-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17887-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17384-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17886-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17887-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19737-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17886-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17886-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17887-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17887-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19737-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T14:25:43</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title>Unintended leak of Proxy-Authorization header in requests</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-32681</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17860-16820</vuln:ProductID>
        <vuln:ProductID>17861-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17860-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17861-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17860-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17861-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17860-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17861-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17860-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.22.0-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17860-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17861-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.27.1-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17861-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-06-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added python-requests to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>An issue was discovered in Qt before 5.15.14 6.x before 6.2.9 and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header allowing unencrypted connections to be established even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-32762</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17864-16820</vuln:ProductID>
        <vuln:ProductID>17865-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17864-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17865-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17864-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17865-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17864-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17865-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17864-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17864-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17865-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17865-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added qt5-qtbase to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-06-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>malformed proposed intoto v0.0.2 entries can cause a panic in Rekor</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-33199</vuln:CVE>
    <vuln:CWE
      ID="CWE-617">Reachable Assertion</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18357-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18357-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18357-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>18357-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18357-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.12.0-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18357-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="50">
    <vuln:Title>sysstat through 12.7.2 allows a multiplication integer overflow in check_overflow in common.c. NOTE: this issue exists because of an incomplete fix for CVE-2022-39377.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-33204</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18362-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18362-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18362-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18362-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18362-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>12.7.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18362-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>An issue was discovered in the Linux kernel before 6.2.9. A use-after-free was found in bq24190_remove in drivers/power/supply/bq24190_charger.c. It could allow a local attacker to crash the system due to a race condition.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-33288</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17873-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.112.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17873-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="11">
    <vuln:Title>Improper sanitization of CSS values in html/template</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Go"
        Type="CNA"
        Ordinal="30">Go</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24539</vuln:CVE>
    <vuln:CWE
      ID="CWE-74">Improper Neutralization of Special Elements in Output Used by a Downstream Component (&amp;#39;Injection&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19679-17084</vuln:ProductID>
        <vuln:ProductID>19712-17086</vuln:ProductID>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:ProductID>18136-16823</vuln:ProductID>
        <vuln:ProductID>18138-16823</vuln:ProductID>
        <vuln:ProductID>18141-17084</vuln:ProductID>
        <vuln:ProductID>18315-17084</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>19693-17084</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>17485-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18136-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18138-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18141-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18136-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18138-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18141-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18136-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18138-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18141-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.21.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18136-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.20.11-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18136-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18138-16823</vuln:ProductID>
        <vuln:ProductID>18141-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.20.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18138-16823</vuln:ProductID>
        <vuln:ProductID>18141-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T04:09:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:08:22</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title>An issue was discovered in the Linux kernel before 6.2. The ntfs3 subsystem does not properly check for correctness during disk reads leading to an out-of-bounds read in ntfs_set_ea in fs/ntfs3/xattr.c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-48502</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17823-16820</vuln:ProductID>
        <vuln:ProductID>17824-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17823-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17824-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17823-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17824-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17823-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17824-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17823-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.188.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17823-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17824-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.122.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17824-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-06-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title>Open redirect vulnerability in Tornado versions 6.3.1 and earlier allows a remote unauthenticated attacker to redirect a user to an arbitrary web site and conduct a phishing attack by having user access a specially crafted URL.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="jpcert"
        Type="CNA"
        Ordinal="30">jpcert</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28370</vuln:CVE>
    <vuln:CWE
      ID="CWE-601">URL Redirection to Untrusted Site (&amp;#39;Open Redirect&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18411-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18411-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18411-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>18411-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18411-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.3.3-11</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18411-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-03-14T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title>llvm-project commit a0138390 was discovered to contain a segmentation fault via the component mlir::Type::isa&lt;mlir::LLVM::LLVMVoidType.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29942</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18373-16823</vuln:ProductID>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18373-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18373-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18373-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18373-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.72.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18373-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-03-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="43">
    <vuln:Title>VideoLAN dav1d before 1.2.0 has a thread_task.c race condition that can lead to an application crash, related to dav1d_decode_frame_exit.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-32570</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization (&amp;#39;Race Condition&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T15:15:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T21:44:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title>An issue in wasm2c 1.0.32, wasm2wat 1.0.32, wasm-decompile 1.0.32, and wasm-validate 1.0.32 allows attackers to cause a Denial of Service (DoS) via running a crafted binary.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-31670</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18469-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T15:16:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:05:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title>Copy_from_user Spectre-V1 Gadget in Linux Kernel</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Google"
        Type="CNA"
        Ordinal="30">Google</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-0459</vuln:CVE>
    <vuln:CWE
      ID="CWE-763">Release of Invalid Pointer or Reference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:ProductID>17849-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17849-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17849-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17849-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17849-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.116.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17849-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-06-02T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="4">
    <vuln:Title>A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. </vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Red Hat Inc."
        Type="CNA"
        Ordinal="30">Red Hat Inc.</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1972</vuln:CVE>
    <vuln:CWE
      ID="CWE-119">Improper Restriction of Operations within the Bounds of a Memory Buffer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18365-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18365-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18365-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18365-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18365-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.37-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18365-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-12-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="7">
    <vuln:Title>In __efi_rt_asm_wrapper of efi-rt-wrapper.S there is a possible bypass of shadow stack protection due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-260821414References: Upstream kernel</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="google_android"
        Type="CNA"
        Ordinal="30">google_android</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-21102</vuln:CVE>
    <vuln:CWE
      ID="CWE-754">Improper Check for Unusual or Exceptional Conditions</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17835-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17835-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17835-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17835-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17835-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.118.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17835-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-08-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title>An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2124</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17823-16820</vuln:ProductID>
        <vuln:ProductID>17824-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17823-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17824-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17823-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17824-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17823-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17824-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17823-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.188.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17823-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17824-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.122.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17824-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="14">
    <vuln:Title>NULL Pointer Dereference in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntr_ai"
        Type="CNA"
        Ordinal="30">@huntr_ai</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2609</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17882-16820</vuln:ProductID>
        <vuln:ProductID>17883-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17882-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17883-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17882-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17883-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17882-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17883-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17882-16820</vuln:ProductID>
        <vuln:ProductID>17883-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.0.1562-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17882-16820</vuln:ProductID>
        <vuln:ProductID>17883-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="15">
    <vuln:Title>Integer Overflow or Wraparound in vim/vim</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="@huntr_ai"
        Type="CNA"
        Ordinal="30">@huntr_ai</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2610</vuln:CVE>
    <vuln:CWE
      ID="CWE-190" />
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17882-16820</vuln:ProductID>
        <vuln:ProductID>17883-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17882-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17883-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17882-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17883-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17882-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17883-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17882-16820</vuln:ProductID>
        <vuln:ProductID>17883-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.0.1562-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17882-16820</vuln:ProductID>
        <vuln:ProductID>17883-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="17">
    <vuln:Title>A vulnerability was found in libvirt. This security flaw ouccers due to repeatedly querying an SR-IOV PCI device's capabilities that exposes a memory leak caused by a failure to free the virPCIVirtualFunction array within the parent struct's g_autoptr cleanup.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2700</vuln:CVE>
    <vuln:CWE
      ID="CWE-401">Missing Release of Memory after Effective Lifetime</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18366-16823</vuln:ProductID>
        <vuln:ProductID>18367-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18366-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18367-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18366-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18367-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18366-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18367-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18366-16823</vuln:ProductID>
        <vuln:ProductID>18367-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.10.0-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18366-16823</vuln:ProductID>
        <vuln:ProductID>18367-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="21">
    <vuln:Title>An improper certificate validation vulnerability exists in curl &lt;v8.1.0 in the way it supports matching of wildcard patterns when listed as "Subject Alternative Name" in TLS server certificates. curl can be built to use its own name matching function for TLS rather than one provided by a TLS library. This private wildcard matching function would match IDN (International Domain Name) hosts incorrectly and could as a result accept patterns that otherwise should mismatch. IDN hostnames are converted to puny code before used for certificate checks. Puny coded names always start with `xn--` and should not be allowed to pattern match but the wildcard check in curl could still check for `x*` which would match even though the IDN name most likely contained nothing even resembling an `x`.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28321</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:ProductID>18287-16823</vuln:ProductID>
        <vuln:ProductID>18337-16823</vuln:ProductID>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18287-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18337-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18287-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18337-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18287-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>18337-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.72.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18287-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.0.34-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18287-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18337-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.2.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18337-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-18T02:40:44</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title>An information disclosure vulnerability exists in curl &lt;v8.1.0 when doing HTTP(S) transfers libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send even when the `CURLOPT_POSTFIELDS` option has been set if the same handle previously wasused to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the second transfer. The problem exists in the logic for a reused handle when it is (expected to be) changed from a PUT to a POST.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28322</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>17875-16820</vuln:ProductID>
        <vuln:ProductID>17876-16823</vuln:ProductID>
        <vuln:ProductID>17877-16823</vuln:ProductID>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:ProductID>17879-17084</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17875-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17876-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17877-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17879-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>17875-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>17876-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>17877-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>17879-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18295-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17875-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17876-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17877-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17878-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17879-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.16.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18295-17084</vuln:ProductID>
        <vuln:ProductID>17878-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17875-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>7.88.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17875-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17876-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.0.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17876-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17877-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.21.4-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17877-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17879-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.21.4-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17879-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added curl to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2026-02-18T15:12:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title>Vitess VTAdmin users that can create shards can deny access to other functions</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29195</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18372-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18372-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18372-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>18372-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18372-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18372-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="26">
    <vuln:Title>A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2953</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18356-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18356-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18356-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18356-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18356-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.4.57-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18356-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2024-09-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title>llvm-project commit fdbc55a5 was discovered to contain a segmentation fault via the component mlir::IROperand&lt;mlir::OpOperand.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29932</vuln:CVE>
    <vuln:CWE
      ID="CWE-119">Improper Restriction of Operations within the Bounds of a Memory Buffer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17093-17086</vuln:ProductID>
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:ProductID>18376-16823</vuln:ProductID>
        <vuln:ProductID>19662-17086</vuln:ProductID>
        <vuln:ProductID>20744-17084</vuln:ProductID>
        <vuln:ProductID>20822-17084</vuln:ProductID>
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18376-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18376-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17953-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18376-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19662-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20822-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.72.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17953-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18376-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>12.0.1-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18376-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-21T01:43:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-03-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added llvm to CBL-Mariner 2.0
Added rust to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-01-20T01:01:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:39:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="32">
    <vuln:Title>pluto in Libreswan before 4.11 allows a denial of service (responder SPI mishandling and daemon crash) via unauthenticated IKEv1 Aggressive Mode packets. The earliest affected version is 3.28.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-30570</vuln:CVE>
    <vuln:CWE
      ID="CWE-400">Uncontrolled Resource Consumption</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19899-17084</vuln:ProductID>
        <vuln:ProductID>18358-16823</vuln:ProductID>
        <vuln:ProductID>17755-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19899-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18358-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17755-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19899-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18358-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17755-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19899-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18358-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17755-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19899-17084</vuln:ProductID>
        <vuln:ProductID>17755-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.15-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19899-17084</vuln:ProductID>
        <vuln:ProductID>17755-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18358-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.14-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18358-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-04-01T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added libreswan to Azure Linux 3.0
Added libreswan to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2026-02-19T01:17:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="33">
    <vuln:Title>AutoTools does not set CARES_RANDOM_FILE during cross compilation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-31124</vuln:CVE>
    <vuln:CWE
      ID="CWE-330">Use of Insufficiently Random Values</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.19.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-06-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title>Buffer Underwrite in ares_inet_net_pton()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-31130</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19814-17086</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:ProductID>17866-16823</vuln:ProductID>
        <vuln:ProductID>17867-16823</vuln:ProductID>
        <vuln:ProductID>17868-16823</vuln:ProductID>
        <vuln:ProductID>17869-16823</vuln:ProductID>
        <vuln:ProductID>17870-16823</vuln:ProductID>
        <vuln:ProductID>17871-17084</vuln:ProductID>
        <vuln:ProductID>20279-17084</vuln:ProductID>
        <vuln:ProductID>19746-17084</vuln:ProductID>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19814-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17866-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17867-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17868-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17869-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17870-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17871-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20279-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19746-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19814-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17866-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17867-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17868-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17869-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17870-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17871-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20279-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19746-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19814-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17866-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17867-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17868-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17869-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17870-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17871-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20279-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19746-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:ProductID>17870-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.19.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:ProductID>17870-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>21.1.2-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17866-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.17.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17866-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17867-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.20.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17867-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17868-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.42.0-11</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17868-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17869-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.1.10-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17869-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17871-17084</vuln:ProductID>
        <vuln:ProductID>20279-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.62.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17871-17084</vuln:ProductID>
        <vuln:ProductID>20279-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.2.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2025-04-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added grpc to CBL-Mariner 2.0
Added fluent-bit to CBL-Mariner 2.0
Added nodejs18 to CBL-Mariner 2.0
Added nodejs to CBL-Mariner 2.0
Added c-ares to CBL-Mariner 2.0
Added grpc to Azure Linux 3.0
Added c-ares to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2026-02-18T03:15:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added nodejs to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="39">
    <vuln:Title>0-byte UDP payload DoS in c-ares</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-32067</vuln:CVE>
    <vuln:CWE
      ID="CWE-400">Uncontrolled Resource Consumption</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20279-17084</vuln:ProductID>
        <vuln:ProductID>19746-17084</vuln:ProductID>
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:ProductID>17866-16823</vuln:ProductID>
        <vuln:ProductID>17867-16823</vuln:ProductID>
        <vuln:ProductID>17872-16823</vuln:ProductID>
        <vuln:ProductID>17869-16823</vuln:ProductID>
        <vuln:ProductID>17870-16823</vuln:ProductID>
        <vuln:ProductID>17871-17084</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20279-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19746-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17866-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17867-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17872-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17869-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17870-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17871-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20279-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19746-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17866-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17867-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17872-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17869-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17870-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17871-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20279-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19746-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17862-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17433-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17866-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17867-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17872-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17869-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17870-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17871-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20279-17084</vuln:ProductID>
        <vuln:ProductID>17871-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.62.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20279-17084</vuln:ProductID>
        <vuln:ProductID>17871-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:ProductID>17870-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.19.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17862-16820</vuln:ProductID>
        <vuln:ProductID>17870-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>21.1.2-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17433-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17866-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.17.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17866-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17867-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.20.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17867-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17872-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.42.0-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17872-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17869-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.1.10-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17869-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.4</cvrf:Number>
        <cvrf:Date>2026-02-18T03:15:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added nodejs to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2024-06-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2024-12-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added grpc to CBL-Mariner 2.0
Added python-gevent to CBL-Mariner 2.0
Added fluent-bit to CBL-Mariner 2.0
Added nodejs18 to CBL-Mariner 2.0
Added nodejs to CBL-Mariner 2.0
Added c-ares to CBL-Mariner 2.0
Added grpc to Azure Linux 3.0
Added c-ares to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="40">
    <vuln:Title>etcd key name can be accessed via LeaseTimeToLive API</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-32082</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18375-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18375-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>18375-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.5.3-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title>In the Linux kernel through 6.3.1 a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-32233</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17884-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.112.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17884-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="42">
    <vuln:Title>An issue was discovered in the Linux kernel before 6.1.11. In net/netrom/af_netrom.c there is a use-after-free because accept is also allowed for a successfully connected AF_NETROM socket. However in order for an attacker to exploit this the system must have netrom routing configured or the attacker must have the CAP_NET_ADMIN capability.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-32269</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17884-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17884-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.112.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17884-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>An issue was discovered in Qt before 5.15.15 6.x before 6.2.9 and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered a QTextLayout buffer overflow can be triggered.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-32763</vuln:CVE>
    <vuln:CWE
      ID="CWE-120">Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17864-16820</vuln:ProductID>
        <vuln:ProductID>17865-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17864-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17865-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17864-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17865-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17864-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17865-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17864-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17864-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17865-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17865-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>The Linux kernel before 6.2.9 has a race condition and resultant use-after-free in drivers/net/ethernet/qualcomm/emac/emac.c if a physically proximate attacker unplugs an emac based device.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-33203</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17863-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17873-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17863-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17873-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.112.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17873-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-06-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>An issue was discovered in Qt 5.x before 5.15.14 6.x before 6.2.9 and 6.3.x through 6.5.x before 6.5.1. QDnsLookup has a buffer over-read via a crafted reply from a DNS server.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-33285</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18333-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18333-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18333-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>18333-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18333-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.12.11-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18333-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-31T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="53">
    <vuln:Title>An issue was discovered in the Linux kernel before 6.3.3. There is an out-of-bounds read in crc16 in lib/crc16.c when called from fs/ext4/super.c because ext4_group_desc_csum does not properly check an offset. NOTE: this is disputed by third parties because the kernel is not intended to defend against attackers with the stated "When modifying the block device while it is mounted by the filesystem" access.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-34256</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17844-16820</vuln:ProductID>
        <vuln:ProductID>17849-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17844-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17849-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17844-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17849-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17844-16820</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17849-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17844-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.183.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17844-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17849-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.116.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17849-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-06-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title>Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Google"
        Type="CNA"
        Ordinal="30">Google</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2248</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17893-16820</vuln:ProductID>
        <vuln:ProductID>17889-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17893-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17889-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17893-16820</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17889-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17893-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17893-16820</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17889-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17889-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-10-01T23:11:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="12">
    <vuln:Title>Improper handling of JavaScript whitespace in html/template</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Go"
        Type="CNA"
        Ordinal="30">Go</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24540</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18315-17084</vuln:ProductID>
        <vuln:ProductID>19679-17084</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>19712-17086</vuln:ProductID>
        <vuln:ProductID>19693-17084</vuln:ProductID>
        <vuln:ProductID>17485-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:ProductID>18136-16823</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18136-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>18136-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19679-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17485-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>18136-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.21.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18136-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.20.11-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18136-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T03:33:46</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:05:43</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="25">
    <vuln:Title>Improper handling of empty HTML attributes in html/template</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Go"
        Type="CNA"
        Ordinal="30">Go</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29400</vuln:CVE>
    <vuln:CWE
      ID="CWE-74">Improper Neutralization of Special Elements in Output Used by a Downstream Component (&amp;#39;Injection&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19668-17086</vuln:ProductID>
        <vuln:ProductID>19712-17086</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:ProductID>18140-16823</vuln:ProductID>
        <vuln:ProductID>18138-16823</vuln:ProductID>
        <vuln:ProductID>18141-17084</vuln:ProductID>
        <vuln:ProductID>18315-17084</vuln:ProductID>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:ProductID>19693-17084</vuln:ProductID>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18140-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18138-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18141-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18140-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18138-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18141-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19712-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>17375-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18140-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18138-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18141-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>18315-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19785-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19778-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19697-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.21.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17375-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18140-16823</vuln:ProductID>
        <vuln:ProductID>18138-16823</vuln:ProductID>
        <vuln:ProductID>18141-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.20.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18140-16823</vuln:ProductID>
        <vuln:ProductID>18138-16823</vuln:ProductID>
        <vuln:ProductID>18141-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19785-17086</vuln:ProductID>
        <vuln:ProductID>19778-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T00:39:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:44:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title>llvm-project commit bd456297 was discovered to contain a segmentation fault via the component mlir::Block::getArgument.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29933</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18377-16823</vuln:ProductID>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18377-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18377-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18377-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18377-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.0-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18377-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-03-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-03-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title>llvm-project commit a0138390 was discovered to contain an assertion failure at !replacements.count(op) &amp;&amp; "operation was already replaced.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29935</vuln:CVE>
    <vuln:CWE
      ID="CWE-617">Reachable Assertion</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>18373-16823</vuln:ProductID>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18373-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18373-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18373-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18374-16823</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18373-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.72.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18373-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>18374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>18374-16823</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-03-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="90">
    <vuln:Title>Windows Driver Revocation List Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What kind of security feature could be bypassed by successfully exploiting this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could bypass the revocation list feature by modifying it and therefore impact the integrity of that list.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Secure Boot"
        Type="Tag"
        Ordinal="20">Windows Secure Boot</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28251</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="91">
    <vuln:Title>Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through a specially crafted set of LDAP calls to execute arbitrary code within the context of the LDAP service.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows LDAP - Lightweight Directory Access Protocol"
        Type="Tag"
        Ordinal="20">Windows LDAP - Lightweight Directory Access Protocol</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28283</vuln:CVE>
    <vuln:CWE
      ID="CWE-591">Sensitive Data Storage in Improperly Locked Memory</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.twitter.com/guhe120"&gt;Yuki Chen&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="54">
    <vuln:Title>Windows SMB Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What version of Windows Server 2022 is affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability only affects the hotpatch version of Windows Server 2022.  If you are not running this version of the operating system, no action is required for this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is SMB over QUIC?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;SMB over QUIC introduces an alternative to the TCP network transport, providing secure, reliable connectivity to edge file servers over untrusted networks like the Internet. QUIC is an IETF-standardized protocol with many benefits when compared to TCP. For more information, please visit: &lt;a href="https://aka.ms/smboverquic"&gt;SMB over QUIC&lt;/a&gt;.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows SMB"
        Type="Tag"
        Ordinal="20">Windows SMB</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24898</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/nachoskrnl"&gt;Ben Barnea&lt;/a&gt; with &lt;a href="https://www.akamai.com/"&gt;Akamai Technologies&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="55">
    <vuln:Title>Windows Graphics Component Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition and also to take additional actions prior to exploitation to prepare the target environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain specific limited SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Graphics Component"
        Type="Tag"
        Ordinal="20">Microsoft Graphics Component</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24899</vuln:CVE>
    <vuln:CWE
      ID="CWE-591">Sensitive Data Storage in Improperly Locked Memory</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/hillstone_lab"&gt;Zhang WangJunJie, He YiSheng, Li WenYue, QinFu Xu&lt;/a&gt; with &lt;a href="https://www.hillstonenet.com.cn/"&gt;Hillstone Network Security Research Institute&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="63">
    <vuln:Title>Server for NFS Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows NFS Portmapper"
        Type="Tag"
        Ordinal="20">Windows NFS Portmapper</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24939</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Wei in Kunlun Lab with &lt;a href="https://www.cyberkl.com/"&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="56">
    <vuln:Title>Windows NTLM Security Support Provider Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is memory layout - the vulnerability allows an attacker to collect information that facilitates predicting addressing of the memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows NTLM"
        Type="Tag"
        Ordinal="20">Windows NTLM</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24900</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/kkokkokye"&gt;JeongOh Kyea&lt;/a&gt; with &lt;a href="https://theori.io/"&gt;THEORI&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="64">
    <vuln:Title>Windows Pragmatic General Multicast (PGM) Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows PGM"
        Type="Tag"
        Ordinal="20">Windows PGM</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24940</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Mitigation">
        <vuln:Description>&lt;p&gt;Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:&lt;/p&gt;
&lt;p&gt;The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.&lt;/p&gt;
&lt;p&gt;You can check to see if there is a service running named &lt;strong&gt;Message Queuing&lt;/strong&gt; and TCP port 1801 is listening on the machine.&lt;/p&gt;
</vuln:Description>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/baixia4"&gt;Jarvis_1oop of vulnerability research institute&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mitigation.  This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="57">
    <vuln:Title>Windows NFS Portmapper Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows NFS Portmapper"
        Type="Tag"
        Ordinal="20">Windows NFS Portmapper</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24901</vuln:CVE>
    <vuln:CWE
      ID="CWE-126">Buffer Over-read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Wei in Kunlun Lab with &lt;a href="https://www.cyberkl.com/"&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="65">
    <vuln:Title>Windows Network File System Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability could be exploited over the network by making an unauthenticated, specially crafted call to a Network File System (NFS) service to trigger a Remote Code Execution (RCE).&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Network File System"
        Type="Tag"
        Ordinal="20">Windows Network File System</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24941</vuln:CVE>
    <vuln:CWE
      ID="CWE-908">Use of Uninitialized Resource</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Mitigation">
        <vuln:Description>&lt;p&gt;Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:&lt;/p&gt;
&lt;p&gt;This vulnerability is not exploitable in NFSV2.0 or NFSV3.0. Prior to updating your version of Windows that protects against this vulnerability, you can mitigate an attack by disabling NFSV4.1. This could adversely affect your ecosystem and should only be used as a temporary mitigation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Warning&lt;/strong&gt; You should NOT apply this mitigation unless you have installed the May 2022 Windows security updates. Those updates address &lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26937"&gt;CVE-2022-26937&lt;/a&gt; which is a Critical vulnerability in NFSV2.0 and NFSV3.0.&lt;/p&gt;
&lt;p&gt;The following PowerShell command will disable those versions:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;PS C:\Set-NfsServerConfiguration -EnableNFSV4 $false &lt;/code&gt;&lt;/p&gt;
&lt;p&gt;After running the command, you will need to restart NFS server or reboot the machine.&lt;/p&gt;
&lt;p&gt;To restart NFS server, start a &lt;strong&gt;cmd&lt;/strong&gt; window with &lt;strong&gt;Run as Administrator&lt;/strong&gt;, enter the following commands:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;nfsadmin server stop&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;nfsadmin server start&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;To confirm that NFSv4.1 has been turned off, run the following command in a Powershell window:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;PS C:\Get-NfsServerConfiguration&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Here is the sample output. Notice the EnableNFSv4.1 is &amp;quot;False&amp;quot; now:&lt;/p&gt;
&lt;pre&gt;&lt;code&gt;State : Running
LogActivity :
CharacterTranslationFile : Not Configured
DirectoryCacheSize (KB) : 128
HideFilesBeginningInDot : Disabled
EnableNFSV2 : True
EnableNFSV3 : True
EnableNFSV4 : False
EnableAuthenticationRenewal : True
AuthenticationRenewalIntervalSec : 600
NlmGracePeriodSec : 45
MountProtocol : {TCP, UDP}
NfsProtocol : {TCP, UDP}
NisProtocol : {TCP, UDP}
NlmProtocol : {TCP, UDP}
NsmProtocol : {TCP, UDP}
PortmapProtocol : {TCP, UDP}
MapServerProtocol : {TCP, UDP}
PreserveInheritance : False
NetgroupCacheTimeoutSec : 30
UnmappedUserAccount :
WorldAccount : Everyone
AlwaysOpenByName : False
GracePeriodSec : 240
LeasePeriodSec : 120
OnlineTimeoutSec : 180
&lt;/code&gt;&lt;/pre&gt;
&lt;p&gt;To re-enable NFSv4.1 after you have installed the security update, enter the following command:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Set-NfsServerConfiguration -EnableNFSV4 $True   &lt;/code&gt;&lt;/p&gt;
&lt;p&gt;Again, after running the command you will need to restart NFS server or reboot the machine.&lt;/p&gt;
</vuln:Description>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Wei in Kunlun Lab with &lt;a href="https://www.cyberkl.com/"&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="58">
    <vuln:Title>Win32k Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Win32K"
        Type="Tag"
        Ordinal="20">Windows Win32K</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24902</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/bl1nnnk"&gt;Hou Xiantong(Bl1nnnk)&lt;/a&gt; with &lt;a href="https://src.bytedance.com/static/lab/index.html"&gt;Wuheng Lab of ByteDance&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/arudd1ck"&gt;Andrew Ruddick&lt;/a&gt; with Microsoft Security Response Center</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-18T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added acknowledgements. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="66">
    <vuln:Title>Remote Procedure Call Runtime Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Windows Remote Procedure Call Runtime"
        Type="Tag"
        Ordinal="20">Windows Remote Procedure Call Runtime</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24942</vuln:CVE>
    <vuln:CWE
      ID="CWE-126">Buffer Over-read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Offensive Research &amp;amp; Security Engineering</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="59">
    <vuln:Title>Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To exploit this vulnerability, an attacker would need to send a specially crafted malicious SSTP packet to a SSTP server. This could result in remote code execution on the server side.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Secure Socket Tunneling Protocol (SSTP)"
        Type="Tag"
        Ordinal="20">Windows Secure Socket Tunneling Protocol (SSTP)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24903</vuln:CVE>
    <vuln:CWE
      ID="CWE-415">Double Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.twitter.com/guhe120"&gt;Yuki Chen&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Cyber KunLun&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="67">
    <vuln:Title>Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When Windows message queuing service is running in a PGM Server environment, an attacker could send a specially crafted file over the network to achieve remote code execution and attempt to trigger malicious code.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows PGM"
        Type="Tag"
        Ordinal="20">Windows PGM</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24943</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Mitigation">
        <vuln:Description>&lt;p&gt;Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:&lt;/p&gt;
&lt;p&gt;The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.&lt;/p&gt;
&lt;p&gt;You can check to see if there is a service running named &lt;strong&gt;Message Queuing&lt;/strong&gt; and TCP port 1801 is listening on the machine.&lt;/p&gt;
</vuln:Description>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/baixia4"&gt;Jarvis_1oop of vulnerability research institute&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mitigation.  This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="61">
    <vuln:Title>Remote Desktop Client Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker must send the user a malicious file and convince them to open it.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could host the malicious .rdp file on a file share, a user accessing the .rdp file from the share would be vulnerable to remote code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Remote Desktop Client"
        Type="Tag"
        Ordinal="20">Remote Desktop Client</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24905</vuln:CVE>
    <vuln:CWE
      ID="CWE-284">Improper Access Control</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://il.linkedin.com/in/dordali"&gt;Dor Dali&lt;/a&gt; with Cyolo</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="68">
    <vuln:Title>Windows Bluetooth Driver Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability could allow the disclosure of certain kernel memory content.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Bluetooth Driver"
        Type="Tag"
        Ordinal="20">Microsoft Bluetooth Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24944</vuln:CVE>
    <vuln:CWE
      ID="CWE-843">Access of Resource Using Incompatible Type ('Type Confusion')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Keqi Hu</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Bryan Gonzalez from Ocelot Team @ Metabase Q</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-12T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added an acknowledgement. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-18T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated FAQ information. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="69">
    <vuln:Title>Windows iSCSI Target Service Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability could allow the disclosure of initialized or uninitialized memory in the process heap.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows iSCSI Target Service"
        Type="Tag"
        Ordinal="20">Windows iSCSI Target Service</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24945</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>B1aN</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="70">
    <vuln:Title>Windows Backup Service Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Backup Engine"
        Type="Tag"
        Ordinal="20">Windows Backup Engine</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24946</vuln:CVE>
    <vuln:CWE
      ID="CWE-591">Sensitive Data Storage in Improperly Locked Memory</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/keyz3r0"&gt;k0shl&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Kunlun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="71">
    <vuln:Title>Windows Bluetooth Driver Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthorized attacker could exploit the Windows Bluetooth driver vulnerability by programmatically running certain functions that could lead to remote code execution on the Bluetooth component.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Bluetooth Driver"
        Type="Tag"
        Ordinal="20">Microsoft Bluetooth Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24947</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Keqi Hu</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="72">
    <vuln:Title>Windows Bluetooth Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In order to exploit this vulnerability, the victim must pair with the attacker's Bluetooth device.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authorized attacker could exploit the Windows Bluetooth driver vulnerability by programmatically running certain functions that could lead to elevation of privilege on the Bluetooth component.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Bluetooth Driver"
        Type="Tag"
        Ordinal="20">Microsoft Bluetooth Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24948</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Keqi Hu</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2024-05-06T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added an acknowledgement. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="73">
    <vuln:Title>Windows Kernel Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Kernel"
        Type="Tag"
        Ordinal="20">Windows Kernel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24949</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous working with Trend Micro Zero Day Initiative</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="74">
    <vuln:Title>Microsoft SharePoint Server Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In a network-based attack an attacker who has privileges to create a site on a vulnerable SharePoint server could use this vulnerability to cause the server to leak its NTLM hash.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24950</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002397</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=7a299fb3-33f2-4417-809d-7bf31da6d14e</vuln:URL>
        <vuln:Supercedence>5002385</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5395.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002397</vuln:URL>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002397</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002389</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=c9190144-e85b-4ded-9b6f-cc9b295054f3</vuln:URL>
        <vuln:Supercedence>5002373</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10398.20000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002389</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002389</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002390</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=1aac4804-a1a0-4d40-8d9a-a1ac25def0b0</vuln:URL>
        <vuln:Supercedence>5002375</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.16130.20420</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002390</vuln:URL>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002390</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.twitter.com/chudypb"&gt;Piotr Bazydlo (@chudypb)&lt;/a&gt; of &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="75">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for the Microsoft Office for Mac currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24953</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11605</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:ProductID>10656</vuln:ProductID>
        <vuln:ProductID>10654</vuln:ProductID>
        <vuln:ProductID>10655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11605</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10656</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10654</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11605</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10656</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10654</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11605</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10656</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10654</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.73.23051401</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002372</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=878994f4-26ae-4aa7-89d7-450c0f588de5</vuln:URL>
        <vuln:Supercedence>5002356</vuln:Supercedence>
        <vuln:ProductID>11605</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10398.20000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002372</vuln:URL>
        <vuln:ProductID>11605</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002386</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=b08077f4-7571-4061-86cc-88c7e79d4cbe</vuln:URL>
        <vuln:Supercedence>5002351</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5395.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002386</vuln:URL>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002386</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002386</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=f04a6476-dca6-4716-a14d-8f392999cbf2</vuln:URL>
        <vuln:Supercedence>5002351</vuln:Supercedence>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5395.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002386</vuln:URL>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002386</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002384</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002348</vuln:Supercedence>
        <vuln:ProductID>10656</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5553.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002384</vuln:URL>
        <vuln:ProductID>10656</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002384</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=5c55d47e-7cb5-446c-a67d-5c06b1f01fd3</vuln:URL>
        <vuln:Supercedence>5002348</vuln:Supercedence>
        <vuln:ProductID>10654</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5563.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002384</vuln:URL>
        <vuln:ProductID>10654</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002384</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=22c421ea-7b94-4c31-b0f8-c2255bcce1b6</vuln:URL>
        <vuln:Supercedence>5002348</vuln:Supercedence>
        <vuln:ProductID>10655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5563.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002384</vuln:URL>
        <vuln:ProductID>10655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002384</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/tecr0c"&gt;Rocco Calvi (@TecR0c)&lt;/a&gt; with &lt;a href="https://tecsecurity.io/"&gt;TecSecurity&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-15T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="76">
    <vuln:Title>Microsoft SharePoint Server Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is user tokens and other potentially sensitive information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to total loss of confidentiality (C:H)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A successful attacker could gain the Domain SID prefix for the targeted site.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, privileges required is low (PR:L).  What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker must be authenticated to be able to exploit this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24954</vuln:CVE>
    <vuln:CWE
      ID="CWE-918">Server-Side Request Forgery (SSRF)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002397</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=7a299fb3-33f2-4417-809d-7bf31da6d14e</vuln:URL>
        <vuln:Supercedence>5002385</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5395.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002397</vuln:URL>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002397</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002389</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=c9190144-e85b-4ded-9b6f-cc9b295054f3</vuln:URL>
        <vuln:Supercedence>5002373</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10398.20000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002389</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002389</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002390</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=1aac4804-a1a0-4d40-8d9a-a1ac25def0b0</vuln:URL>
        <vuln:Supercedence>5002375</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.16130.20420</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002390</vuln:URL>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002390</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/testanull"&gt;Jang (Nguyễn Tiến Giang) of StarLabs SG&lt;/a&gt; working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="77">
    <vuln:Title>Microsoft SharePoint Server Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In a network-based attack, an authenticated attacker as a Site Owner could execute code remotely on the SharePoint Server.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24955</vuln:CVE>
    <vuln:CWE
      ID="CWE-94">Improper Control of Generation of Code ('Code Injection')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.2</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002397</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=7a299fb3-33f2-4417-809d-7bf31da6d14e</vuln:URL>
        <vuln:Supercedence>5002385</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5395.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002397</vuln:URL>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002397</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002389</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=c9190144-e85b-4ded-9b6f-cc9b295054f3</vuln:URL>
        <vuln:Supercedence>5002373</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10398.20000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002389</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002389</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002390</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=1aac4804-a1a0-4d40-8d9a-a1ac25def0b0</vuln:URL>
        <vuln:Supercedence>5002375</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.16130.20420</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002390</vuln:URL>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002390</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/testanull"&gt;Jang (Nguyễn Tiến Giang) of StarLabs SG&lt;/a&gt; working with &lt;a href="https://www.zerodayinitiative.com/"&gt;Trend Micro Zero Day Initiative&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="97">
    <vuln:Title>Windows MSHTML Platform Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L) and some loss of availability (A:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploits the vulnerability could craft a malicious URL that would evade zone checks, resulting in a limited loss of integrity and availability on the victim machine.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are there additional steps that I need to take to be protected from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. Customers must install the updates for CVE-2023-23397 and CVE-2023-29324 to be fully protected. For more information, please see the MSRC Blog Post relating to CVE-2023-23397 here: &lt;a href="https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/"&gt;Microsoft Mitigates Outlook Elevation of Privilege Vulnerability&lt;/a&gt;.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.&lt;/p&gt;
&lt;p&gt;To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows MSHTML Platform"
        Type="Tag"
        Ordinal="20">Windows MSHTML Platform</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29324</vuln:CVE>
    <vuln:CWE
      ID="CWE-73">External Control of File Name or Path</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026366</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026366</vuln:URL>
        <vuln:Supercedence>5022835</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>IE Cumulative</vuln:SubType>
        <vuln:FixedBuild>1.1.0.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026366</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026366</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/nachoskrnl"&gt;Ben Barnea&lt;/a&gt; with &lt;a href="https://www.akamai.com/"&gt;Akamai Technologies&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="100">
    <vuln:Title>Microsoft Word Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What kind of security feature could be bypassed by successfully exploiting this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability could allow an attacker to bypass specific functionality of the Office Protected View.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires that a user open a specially crafted file.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.&lt;/li&gt;
&lt;li&gt;In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Word"
        Type="Tag"
        Ordinal="20">Microsoft Office Word</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29335</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>10746</vuln:ProductID>
        <vuln:ProductID>10747</vuln:ProductID>
        <vuln:ProductID>10606</vuln:ProductID>
        <vuln:ProductID>10604</vuln:ProductID>
        <vuln:ProductID>10605</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10746</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10747</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10606</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10604</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10605</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10746</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10747</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10606</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10604</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10605</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10746</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10747</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10606</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10604</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10605</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002369</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=54834ad2-4176-4e8d-b0dc-85e51eb35245</vuln:URL>
        <vuln:Supercedence>5002323</vuln:Supercedence>
        <vuln:ProductID>10746</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5395.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002369</vuln:URL>
        <vuln:ProductID>10746</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002369</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002369</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=4bf36666-8bde-49e3-8678-131f82b1c81d</vuln:URL>
        <vuln:Supercedence>5002323</vuln:Supercedence>
        <vuln:ProductID>10747</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5395.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002369</vuln:URL>
        <vuln:ProductID>10747</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002369</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002365</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>10606</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5553.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002365</vuln:URL>
        <vuln:ProductID>10606</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002365</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002365</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=2e63168a-f2b2-490d-b211-de7ae61fad16</vuln:URL>
        <vuln:Supercedence>5002316</vuln:Supercedence>
        <vuln:ProductID>10604</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5553.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002365</vuln:URL>
        <vuln:ProductID>10604</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002365</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002365</vuln:Description>
        <vuln:URL>https://www.microsoft.com/download/details.aspx?familyid=468b2bcf-481a-4aba-973a-46c92b708b73</vuln:URL>
        <vuln:Supercedence>5002316</vuln:Supercedence>
        <vuln:ProductID>10605</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.0.5553.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002365</vuln:URL>
        <vuln:ProductID>10605</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002365</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Felix Boulet</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="101">
    <vuln:Title>Win32k Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Win32K"
        Type="Tag"
        Ordinal="20">Windows Win32K</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29336</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Jan Vojtěšek, Mil&amp;#225;nek, and Luigino Camastra with Avast</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="102">
    <vuln:Title>Visual Studio Code Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authorized attacker must send the user a malicious file and convince the user to open it.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Visual Studio Code"
        Type="Tag"
        Ordinal="20">Visual Studio Code</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29338</vuln:CVE>
    <vuln:CWE
      ID="CWE-285">Improper Authorization</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.6</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://code.visualstudio.com/Download</vuln:URL>
        <vuln:ProductID>11622</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.78.1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://code.visualstudio.com/updates/v1_78</vuln:URL>
        <vuln:ProductID>11622</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://blog.xlab.app/"&gt;xinyue.hu&lt;/a&gt; with &lt;a href="https://www.chaitin.cn/"&gt;Chaitin&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://blog.xlab.app/"&gt;xinyue.hu&lt;/a&gt; with &lt;a href="https://www.chaitin.cn/"&gt;Chaitin&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="103">
    <vuln:Title>AV1 Video Extension Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Windows vulnerable in the default configuration?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No. Only customers who have installed this app from the Microsoft Store may be vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How do I get the updated app?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see &lt;a href="https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f"&gt;here&lt;/a&gt; for details.&lt;/p&gt;
&lt;p&gt;It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;My system is in a disconnected environment; is it vulnerable?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I check if the update is installed?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;App package versions &lt;strong&gt;1.1.60961.0&lt;/strong&gt; and later contain this update.&lt;/p&gt;
&lt;p&gt;You can check the package version in PowerShell:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Get-AppxPackage -Name Microsoft.AV1VideoExtension&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;You can also check the package version by clicking the &lt;strong&gt;Start Menu&lt;/strong&gt; - &lt;strong&gt;Settings&lt;/strong&gt; - &lt;strong&gt;Apps&lt;/strong&gt; - &lt;strong&gt;AV1 Video Extension&lt;/strong&gt; - &lt;strong&gt;Advanced options&lt;/strong&gt;&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Windows Codecs Library"
        Type="Tag"
        Ordinal="20">Microsoft Windows Codecs Library</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29340</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11807</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11807</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11807</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11807</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Information</vuln:Description>
        <vuln:URL>https://apps.microsoft.com/store/detail/av1-video-extension/9MVZQVXJBQ9V?hl=en-us&amp;gl=US</vuln:URL>
        <vuln:ProductID>11807</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.1.60961.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f#WindowsVersion=Windows_11</vuln:URL>
        <vuln:ProductID>11807</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Information</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-17T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated the build numbers.  This is an informational update only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="104">
    <vuln:Title>AV1 Video Extension Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Windows vulnerable in the default configuration?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No. Only customers who have installed this app from the Microsoft Store may be vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How do I get the updated app?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Microsoft Store will automatically update affected customers. Alternatively, customers can get the update immediately; see &lt;a href="https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f"&gt;here&lt;/a&gt; for details.&lt;/p&gt;
&lt;p&gt;It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;My system is in a disconnected environment; is it vulnerable?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Customers using the Microsoft Store for Business and Microsoft Store for Education can get this update through their organizations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I check if the update is installed?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;App package versions &lt;strong&gt;1.1.60961.0&lt;/strong&gt; and later contain this update.&lt;/p&gt;
&lt;p&gt;You can check the package version in PowerShell:&lt;/p&gt;
&lt;p&gt;&lt;code&gt;Get-AppxPackage -Name Microsoft.AV1VideoExtension&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;You can also check the package version by clicking the &lt;strong&gt;Start Menu&lt;/strong&gt; - &lt;strong&gt;Settings&lt;/strong&gt; - &lt;strong&gt;Apps&lt;/strong&gt; - &lt;strong&gt;AV1 Video Extension&lt;/strong&gt; - &lt;strong&gt;Advanced options&lt;/strong&gt;&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Windows Codecs Library"
        Type="Tag"
        Ordinal="20">Microsoft Windows Codecs Library</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29341</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11807</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11807</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11807</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11807</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Information</vuln:Description>
        <vuln:URL>https://apps.microsoft.com/store/detail/av1-video-extension/9MVZQVXJBQ9V?hl=en-us&amp;gl=US</vuln:URL>
        <vuln:ProductID>11807</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.1.60961.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f#WindowsVersion=Windows_11</vuln:URL>
        <vuln:ProductID>11807</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Information</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-17T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated the build numbers.  This is an informational update only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="105">
    <vuln:Title>SysInternals Sysmon for Windows Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="SysInternals"
        Type="Tag"
        Ordinal="20">SysInternals</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29343</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access ('Link Following')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12114</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12114</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12114</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12114</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Information</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon</vuln:URL>
        <vuln:ProductID>12114</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.16</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon</vuln:URL>
        <vuln:ProductID>12114</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Information</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/filip_dragovic"&gt;Filip Dragović&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-10-12T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated FAQ information. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="108">
    <vuln:Title>Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The user would have to click on a specially crafted URL to be compromised by the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of Integrity (I:L)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Attacker is able to bypass Content Security Policy (CSP) and Pop-up blocker this this vulnerability, but cannot modify additional content of the browser itself.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability could lead to a browser iFrame sandbox escape, but not a full browser sandbox escape.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29354</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/shhnjk"&gt;Jun Kokatsu&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="107">
    <vuln:Title>Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The user would have to click on a specially crafted URL to be compromised by the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), integrity (I:H), and (A:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability could lead to a full compromise of the browser.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29350</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>Chromium: CVE-2023-2468 Inappropriate implementation in PictureInPicture</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2468</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="44">
    <vuln:Title>Chromium: CVE-2023-2460 Insufficient validation of untrusted input in Extensions</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2460</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>Chromium: CVE-2023-2462 Inappropriate implementation in Prompts</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2462</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>Chromium: CVE-2023-2463 Inappropriate implementation in Full Screen Mode</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2463</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>Chromium: CVE-2023-2464 Inappropriate implementation in PictureInPicture</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2464</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>Chromium: CVE-2023-2465 Inappropriate implementation in CORS</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2465</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="50">
    <vuln:Title>Chromium: CVE-2023-2466 Inappropriate implementation in Prompts</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2466</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>Chromium: CVE-2023-2467 Inappropriate implementation in Prompts</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2467</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="43">
    <vuln:Title>Chromium: CVE-2023-2459 Inappropriate implementation in Prompts</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.35&lt;/td&gt;
&lt;td&gt;113.0.5672.63/.64&lt;/td&gt;
&lt;td&gt;5/5/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.71&lt;/td&gt;
&lt;td&gt;112.0.5615.179&lt;/td&gt;
&lt;td&gt;5/4/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2459</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.35</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="88">
    <vuln:Title>Chromium: CVE-2023-2726 Inappropriate implementation in WebApp Installs</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.50&lt;/td&gt;
&lt;td&gt;113.0.5672.126/.127&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.84&lt;/td&gt;
&lt;td&gt;112.0.5615.204&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2726</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>112.0.1722.84</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-18T20:38:53</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="83">
    <vuln:Title>Chromium: CVE-2023-2721 Use after free in Navigation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.50&lt;/td&gt;
&lt;td&gt;113.0.5672.126/.127&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.84&lt;/td&gt;
&lt;td&gt;112.0.5615.204&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2721</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>112.0.1722.84</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-18T20:38:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="84">
    <vuln:Title>Chromium: CVE-2023-2722 Use after free in Autofill UI</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.50&lt;/td&gt;
&lt;td&gt;113.0.5672.126/.127&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.84&lt;/td&gt;
&lt;td&gt;112.0.5615.204&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2722</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>112.0.1722.84</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-18T20:38:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="85">
    <vuln:Title>Chromium: CVE-2023-2723 Use after free in DevTools</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.50&lt;/td&gt;
&lt;td&gt;113.0.5672.126/.127&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.84&lt;/td&gt;
&lt;td&gt;112.0.5615.204&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2723</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>112.0.1722.84</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-18T20:38:43</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="86">
    <vuln:Title>Chromium: CVE-2023-2724 Type Confusion in V8</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.50&lt;/td&gt;
&lt;td&gt;113.0.5672.126/.127&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.84&lt;/td&gt;
&lt;td&gt;112.0.5615.204&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2724</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>112.0.1722.84</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-18T20:38:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="87">
    <vuln:Title>Chromium: CVE-2023-2725 Use after free in Guest View</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2023"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Channel&lt;/th&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stable&lt;/td&gt;
&lt;td&gt;113.0.1774.50&lt;/td&gt;
&lt;td&gt;113.0.5672.126/.127&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Extended Stable&lt;/td&gt;
&lt;td&gt;112.0.1722.84&lt;/td&gt;
&lt;td&gt;112.0.5615.204&lt;/td&gt;
&lt;td&gt;5/18/2023&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2725</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12142</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>113.0.1774.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>112.0.1722.84</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>12142</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-18T20:38:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="92">
    <vuln:Title>Microsoft Remote Desktop app for Windows Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;When an Microsoft Remote Desktop app for Windows client connects to the server and the user saves the self-signed certificate, the serial number is used to compare the certificate for future use. An attacker could swap out a forged certificate with the same serial number resulting in a machine-in-the-middle (MITM) attack.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could recover plaintext from TLS-protected data.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How do I get the update for a Windows App?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The Microsoft Store will automatically update affected customers.&lt;/p&gt;
&lt;p&gt;It is possible for customers to disable automatic updates for the Microsoft Store. The Microsoft Store will not automatically install this update for those customers. You can get the update through the store by following this guide: &lt;a href="https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f#WindowsVersion=Windows_11"&gt;Get updates for apps and games in Microsoft Store&lt;/a&gt;. Be sure to select the tab for the operating system installed on your device to search for updates.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows RDP Client"
        Type="Tag"
        Ordinal="20">Windows RDP Client</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28290</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11850</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11850</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11850</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>4.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11850</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/?LinkID=616709</vuln:URL>
        <vuln:ProductID>11850</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.2.3006.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/virtual-desktop/whats-new-client-microsoft-store</vuln:URL>
        <vuln:ProductID>11850</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://github.com/dscheg"&gt;dscheg&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="53">
    <vuln:Title>Microsoft Teams Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability could disclose sensitive information, which might include a user's full trust token.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In a network-based attack, an attacker could host a site containing malicious code. When a target accesses that site, it could force open a full trust application and potentially obtain a user's full trust token.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires that a user navigate to a malicious site hosted on *.sharepoint.com.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Teams"
        Type="Tag"
        Ordinal="20">Microsoft Teams</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24881</vuln:CVE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11686</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11686</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11686</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11686</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://docs.microsoft.com/en-us/microsoftteams/teams-client-update</vuln:URL>
        <vuln:ProductID>11686</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.10.1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/microsoftteams/teams-client-update</vuln:URL>
        <vuln:ProductID>11686</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Dan Saunders with &lt;a href="https://www.microsoft.com/"&gt;Microsoft&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Trevor Harris with &lt;a href="https://www.microsoft.com/"&gt;Microsoft&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-07-21T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Removed one of the FAQs. This is an information change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="60">
    <vuln:Title>Windows Installer Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker would only be able to delete targeted files on a system. They would not gain privileges to view or modify file contents.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metrics, successful exploitation of this vulnerability could lead to no loss of confidentiality (C:N) but have major impact on integrity (I:H) and on availability (A:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability does not allow disclosure of any confidential information, but could allow an attacker to delete data that could include data that results in the service being unavailable.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Installer"
        Type="Tag"
        Ordinal="20">Windows Installer</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24904</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access ('Link Following')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Naceri with MSRC V&amp;M</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="98">
    <vuln:Title>Windows OLE Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, the Preview Pane is an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition and also to take additional actions prior to exploitation to prepare the target environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted email to the victim. Exploitation of the vulnerability might involve either a victim opening a specially crafted email with an affected version of Microsoft Outlook software, or a victim's Outlook application displaying a preview of a specially crafted email . This could result in the attacker executing remote code on the victim's machine.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows OLE"
        Type="Tag"
        Ordinal="20">Windows OLE</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29325</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation More Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026362</vuln:URL>
        <vuln:Supercedence>5025229</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.4377</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026362</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026362</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026362</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026370</vuln:URL>
        <vuln:Supercedence>5025230</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1726</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026370</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026370</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026370</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026456</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Hotpatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.1724</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026456</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026456</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026368</vuln:URL>
        <vuln:Supercedence>5025224</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.1936</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026368</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026368</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026368</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026372</vuln:URL>
        <vuln:Supercedence>5025239</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.1702</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026372</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026372</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026372</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026382</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026382</vuln:URL>
        <vuln:Supercedence>5025234</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.19926</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026382</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026382</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026363</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026363</vuln:URL>
        <vuln:Supercedence>5025228</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.5921</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026363</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026363</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026408</vuln:URL>
        <vuln:Supercedence>5025271</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026408</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026408</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026408</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.22070</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026427</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026427</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026427</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026413</vuln:URL>
        <vuln:Supercedence>5025279</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026413</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026413</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026413</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.26519</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026426</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026426</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026426</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026419</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026419</vuln:URL>
        <vuln:Supercedence>5025287</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026419</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026419</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.24266</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026411</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026415</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026415</vuln:URL>
        <vuln:Supercedence>5025285</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026415</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026415</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026409</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.20969</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026409</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026409</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Workaround">
        <vuln:Description>&lt;p&gt;&lt;strong&gt;Use Microsoft Outlook to reduce the risk of users opening RTF Files from unknown or untrusted sources&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To help protect against this vulnerability, we recommend users read email messages in plain text format.&lt;/p&gt;
&lt;p&gt;For guidance on how to configure Microsoft Outlook to read all standard mail in plain text, please refer to &lt;a href="https://support.microsoft.com/en-us/office/read-email-messages-in-plain-text-16dfe54a-fadc-4261-b2ce-19ad072ed7e3"&gt;Read email messages in plain text&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Impact of workaround:&lt;/strong&gt; Email messages that are viewed in plain text format will not contain pictures, specialized fonts, animations, or other rich content. In addition, the following behavior may be experienced:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The changes are applied to the preview pane and to open messages.&lt;/li&gt;
&lt;li&gt;Pictures become attachments so that they are not lost.&lt;/li&gt;
&lt;li&gt;Because the message is still in Rich Text or HTML format in the store, the object model (custom code solutions) may behave unexpectedly.&lt;/li&gt;
&lt;/ul&gt;
</vuln:Description>
        <vuln:AffectedFiles />
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/wdormann"&gt;Will Dormann&lt;/a&gt; with Vul Labs</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="99">
    <vuln:Title>Microsoft Access Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of availability (A:L)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The performance can be interrupted and/or reduced, but the attacker cannot fully deny service.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Access"
        Type="Tag"
        Ordinal="20">Microsoft Office Access</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29333</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Baris Reyhan with &lt;a href="https://www.netpack.nl/"&gt;Netpack B.V.&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="106">
    <vuln:Title>Microsoft Office Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;A user needs to be tricked into running malicious files.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for the Microsoft Office for Mac currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The security update for Microsoft Office 2019 for Mac and Microsoft Office LTSC for Mac 2021 are not immediately available. The updates will be released as soon as possible, and when they are available, customers will be notified via a revision to this CVE information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office"
        Type="Tag"
        Ordinal="20">Microsoft Office</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29344</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11575</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.73.23051401</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11575</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/office365-proplus-security-updates</vuln:URL>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Kai Lu with Zscaler's ThreatLabz</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-15T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="42">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2426</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2426</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2426</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2426</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@huntr.dev"
        Type="CNA"
        Ordinal="30">security@huntr.dev</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2426</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-9.0.1562-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-9.0.1562-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>9.0.1562-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2426</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>vim</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-9.0.1562-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-9.0.1562-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>9.0.1562-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2426</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>vim</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-9.0.1562-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-9.0.1562-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>9.0.1562-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2426</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>vim</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>vim</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>vim-9.0.1562-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>vim-extra-9.0.1562-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>9.0.1562-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2426</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>vim</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added vim to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@google.com"
        Type="CNA"
        Ordinal="30">security@google.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1998</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>5.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>5.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>5.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>5.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.189.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.189.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.189.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.189.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.189.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.189.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.118.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.118.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.118.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.118.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.118.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.118.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.118.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.118.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.118.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.118.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.118.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.118.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.118.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.118.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.118.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.118.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1998</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-04-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2023-04-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added hyperv-daemons to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="114">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-31436</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.179.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.179.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.179.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.179.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.111.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.111.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.111.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.111.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-31436</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added hyperv-daemons to CBL-Mariner 1.0
Added hyperv-daemons to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="12">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0458</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0458</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0458</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0458</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@google.com"
        Type="CNA"
        Ordinal="30">security@google.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-0458</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0458</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0458</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0458</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0458</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="26">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2006</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2006</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2006</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2006</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2006</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2006</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2006</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2006</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2006</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2019</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2019</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2019</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2019</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2019</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-27404</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.11.1-2.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.11.1-2.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.11.1-2.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.11.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.11.1-2.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.11.1-2.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.11.1-2.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.11.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.11.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.11.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.11.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.11.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.15.9-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.11.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.11.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.11.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.11.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.15.9-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27404</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-05-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-05-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added freetype to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added qt5-qtbase to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="6">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-27406</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.12.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.12.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.12.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.12.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.12.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.12.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.12.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.12.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.12.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.12.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.12.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.12.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.15.9-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.12.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.12.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.12.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.12.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.15.9-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-27406</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-05-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2022-05-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added freetype to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added qt5-qtbase to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-4095</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-4095</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-4095</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-4095</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-4095</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-4095</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-4095</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-4095</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-4095</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="13">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0590</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0590</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0590</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0590</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-0590</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0590</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0590</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0590</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0590</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="15">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1252</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1252</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1252</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1252</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1252</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1252</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1252</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1252</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1252</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0179</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0179</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0179</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0179</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-0179</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0179</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0179</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0179</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0179</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="111">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30456</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30456</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30456</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30456</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-30456</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30456</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30456</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30456</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30456</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="21">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1855</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.107.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.107.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.107.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.107.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1855</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-04-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added hyperv-daemons to CBL-Mariner 1.0
Added hyperv-daemons to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="20">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1838</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1838</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1838</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1838</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1838</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1838</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1838</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1838</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1838</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="19">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1829</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1829</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1829</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1829</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@google.com"
        Type="CNA"
        Ordinal="30">security@google.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1829</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1829</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1829</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1829</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1829</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="113">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-30772</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.179.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.179.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.179.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-30772</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-27T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 1.0
Added kernel to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="82">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-26917</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-26917</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-26917</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>libyang</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-2.1.55-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-devel-2.1.55-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-devel-doc-2.1.55-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-tools-2.1.55-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-debuginfo-2.1.55-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.1.55-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-26917</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>libyang</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>libyang</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-2.1.55-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-devel-2.1.55-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-devel-doc-2.1.55-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-tools-2.1.55-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>libyang-debuginfo-2.1.55-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.1.55-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-26917</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>libyang</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21972</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21972</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert_us@oracle.com"
        Type="CNA"
        Ordinal="30">secalert_us@oracle.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-21972</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21972</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21972</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21976</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21976</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert_us@oracle.com"
        Type="CNA"
        Ordinal="30">secalert_us@oracle.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-21976</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21976</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21976</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21977</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21977</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert_us@oracle.com"
        Type="CNA"
        Ordinal="30">secalert_us@oracle.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-21977</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21977</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21977</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-24607</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-24607</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-24607</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-24607</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24607</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.12.11-4.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.12.11-4.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.12.11-4.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.12.11-4.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.12.11-4.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.12.11-4.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.12.11-4.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.12.11-4.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.12.11-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-24607</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.12.11-4.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.12.11-4.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.12.11-4.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.12.11-4.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.12.11-4.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.12.11-4.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.12.11-4.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.12.11-4.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.12.11-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-24607</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.15.9-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-24607</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.15.9-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-24607</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-05T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46878</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46878</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46878</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>fluent-bit</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-1.5.2-3.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-devel-1.5.2-3.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-debuginfo-1.5.2-3.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.5.2-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2021-46878</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>fluent-bit</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>fluent-bit</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-1.5.2-3.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-devel-1.5.2-3.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-debuginfo-1.5.2-3.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.5.2-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2021-46878</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>fluent-bit</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="4">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46879</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-46879</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-46879</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>fluent-bit</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-1.5.2-3.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-devel-1.5.2-3.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-debuginfo-1.5.2-3.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.5.2-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2021-46879</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>fluent-bit</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>fluent-bit</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-1.5.2-3.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-devel-1.5.2-3.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>fluent-bit-debuginfo-1.5.2-3.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.5.2-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2021-46879</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>fluent-bit</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="109">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-29491</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-29491</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-29491</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-29491</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-29491</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>ncurses</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-6.4-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-libs-6.4-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-compat-6.4-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-devel-6.4-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-term-6.4-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-debuginfo-6.4-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-29491</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>ncurses</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>ncurses</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-6.4-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-libs-6.4-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-compat-6.4-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-devel-6.4-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-term-6.4-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-debuginfo-6.4-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-29491</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>ncurses</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>ncurses</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-6.4-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-libs-6.4-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-compat-6.4-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-devel-6.4-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-term-6.4-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-debuginfo-6.4-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-29491</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>ncurses</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>ncurses</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-6.4-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-libs-6.4-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-compat-6.4-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-devel-6.4-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-term-6.4-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ncurses-debuginfo-6.4-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-29491</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>ncurses</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="96">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28856</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28856</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28856</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28856</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security-advisories@github.com"
        Type="CNA"
        Ordinal="30">security-advisories@github.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28856</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>redis</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>redis-6.2.12-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>redis-debuginfo-6.2.12-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.2.12-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28856</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>redis</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>redis</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>redis-6.2.12-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>redis-debuginfo-6.2.12-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.2.12-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28856</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>redis</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>redis</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>redis-6.2.12-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>redis-debuginfo-6.2.12-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.2.12-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28856</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>redis</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>redis</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>redis-6.2.12-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>redis-debuginfo-6.2.12-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.2.12-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28856</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>redis</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2019-9210</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2019-9210</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2019-9210</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>advancecomp</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>advancecomp-2.4-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>advancecomp-debuginfo-2.4-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.1-14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2019-9210</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>advancecomp</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>advancecomp</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>advancecomp-2.4-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>advancecomp-debuginfo-2.4-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.1-14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2019-9210</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>advancecomp</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2021-12-16T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2020-0569</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2020-0569</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secure@intel.com"
        Type="CNA"
        Ordinal="30">secure@intel.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2020-0569</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtsvg</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtsvg-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtsvg-devel-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtsvg-examples-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtsvg-debuginfo-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2020-0569</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtsvg</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtsvg</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtsvg-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtsvg-devel-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtsvg-examples-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtsvg-debuginfo-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2020-0569</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtsvg</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-10-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="40">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-22795</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-22795</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="support@hackerone.com"
        Type="CNA"
        Ordinal="30">support@hackerone.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-22795</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>ruby</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>ruby-3.1.4-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>rubygems-3.3.26-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>rubygems-devel-3.3.26-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ruby-debuginfo-3.1.4-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>3.1.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-22795</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>ruby</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>ruby</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>ruby-3.1.4-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>rubygems-3.3.26-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>rubygems-devel-3.3.26-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>ruby-debuginfo-3.1.4-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>3.1.4-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-22795</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>ruby</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-02-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="89">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-27477</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-27477</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security-advisories@github.com"
        Type="CNA"
        Ordinal="30">security-advisories@github.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-27477</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>rust</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>rust-1.68.2-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>rust-doc-1.68.2-2.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>rust-debuginfo-1.68.2-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.68.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-27477</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>rust</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>rust</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>rust-1.68.2-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>rust-doc-1.68.2-2.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>rust-debuginfo-1.68.2-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.68.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-27477</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>rust</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2008</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2008</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2008</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2008</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2008</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2008</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2008</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2008</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2008</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="81">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-26463</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-26463</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-26463</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>9.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>strongswan</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-5.9.10-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-debuginfo-5.9.10-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.9.10-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-26463</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>strongswan</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>strongswan</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-5.9.10-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>strongswan-debuginfo-5.9.10-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.9.10-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-26463</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>strongswan</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-26T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="32">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2177</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2177</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2177</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2177</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2177</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2177</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2177</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2177</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2177</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="33">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2194</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2194</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2194</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2194</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2194</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2194</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2194</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2194</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2194</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="94">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28328</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28328</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28328</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28328</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28328</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28328</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28328</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28328</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28328</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2166</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2166</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2166</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2166</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2166</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2166</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2166</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2166</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2166</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2162</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2162</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2162</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2162</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2162</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2162</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2162</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2162</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2162</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="7">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-2989</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-2989</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-2989</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>podman</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>podman-4.1.1-10.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-docker-4.1.1-10.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-tests-4.1.1-10.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-remote-4.1.1-10.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-plugins-4.1.1-10.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-gvproxy-4.1.1-10.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-debuginfo-4.1.1-10.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>4.1.1-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-2989</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>podman</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>podman</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>podman-4.1.1-10.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-docker-4.1.1-10.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-tests-4.1.1-10.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-remote-4.1.1-10.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-plugins-4.1.1-10.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-gvproxy-4.1.1-10.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>podman-debuginfo-4.1.1-10.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>4.1.1-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-2989</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>podman</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2022-09-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-20958</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-20958</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@android.com"
        Type="CNA"
        Ordinal="30">security@android.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-20958</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.15.9-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.15.9-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.12.11-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-20958</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>qt5-qtbase</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-common-5.15.9-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-devel-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-private-devel-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-examples-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-static-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-gui-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>qt5-qtbase-debuginfo-5.15.9-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.12.11-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-20958</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>qt5-qtbase</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-23T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="95">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28466</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28466</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28466</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28466</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28466</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28466</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28466</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28466</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28466</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-22T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="14">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1249</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1249</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1249</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1249</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1249</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1249</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1249</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1249</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1249</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-3923</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2021-3923</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2021-3923</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.3</vuln:BaseScore>
        <vuln:TemporalScore>2.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.3</vuln:BaseScore>
        <vuln:TemporalScore>2.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2021-3923</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2021-3923</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="18">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1670</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1670</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1670</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1670</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1670</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1670</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1670</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.107.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.107.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.107.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1670</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.107.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.107.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.107.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1670</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added hyperv-daemons to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="17">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1652</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.185.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.185.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1652</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-08T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added hyperv-daemons to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-04-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kernel to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1872</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1872</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1872</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1872</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="security@google.com"
        Type="CNA"
        Ordinal="30">security@google.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1872</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1872</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1872</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1872</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1872</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1990</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.177.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.177.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.177.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1990</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-24T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added hyperv-daemons to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="11">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-0386</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.107.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.107.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.189.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.189.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.189.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.188.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.185.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.185.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.189.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.189.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.189.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.188.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.185.1-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.185.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0386</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-03-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added hyperv-daemons to CBL-Mariner 1.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-48468</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-48468</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-48468</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2022-48468</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-48468</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>protobuf-c</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-1.4.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-devel-1.4.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-static-1.4.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-debuginfo-1.4.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.4.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-48468</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>protobuf-c</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>protobuf-c</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-1.4.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-devel-1.4.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-static-1.4.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-debuginfo-1.4.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.4.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-48468</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>protobuf-c</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>protobuf-c</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-1.3.2-2.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-devel-1.3.2-2.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-static-1.3.2-2.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-debuginfo-1.3.2-2.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.3.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-48468</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>protobuf-c</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>protobuf-c</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-1.3.2-2.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-devel-1.3.2-2.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-static-1.3.2-2.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>protobuf-c-debuginfo-1.3.2-2.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>1.3.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2022-48468</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>protobuf-c</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-19T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21982</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21982</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert_us@oracle.com"
        Type="CNA"
        Ordinal="30">secalert_us@oracle.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-21982</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.9</vuln:BaseScore>
        <vuln:TemporalScore>4.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21982</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21982</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-20T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21980</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-21980</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert_us@oracle.com"
        Type="CNA"
        Ordinal="30">secalert_us@oracle.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-21980</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21980</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>mysql</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-devel-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>mysql-debuginfo-8.0.33-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>8.0.33-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-21980</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>mysql</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-22T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="25">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2004</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2004</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2004</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-2004</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-2004</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.13.0-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.13.0-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.13.0-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.13.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2004</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.13.0-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.13.0-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.13.0-1.cm1.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.13.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2004</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.13.0-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.13.0-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.13.0-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.13.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2004</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>freetype</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-2.13.0-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-devel-2.13.0-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>freetype-debuginfo-2.13.0-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>2.13.0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-2004</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>freetype</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-17T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added freetype to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="cve@mitre.org"
        Type="CNA"
        Ordinal="30">cve@mitre.org</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-23000</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.111.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.111.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.135.1-2.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.135.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.15.111.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.15.111.1-1.cm2.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.135.1-2.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.135.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervkvpd-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervvssd-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hypervfcopyd-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-license-5.10.181.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-tools-5.10.181.1-1.cm1.noarch.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>hyperv-daemons-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>hyperv-daemons</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-23000</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>hyperv-daemons</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-04T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-04-03T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2023-03-09T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.3</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="16">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1382</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1382</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1382</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-1382</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-1382</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12137</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12138</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1382</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1382</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-oprofile-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.10.181.1-1.cm1.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1382</vuln:URL>
        <vuln:ProductID>12137</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.10.181.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-1382</vuln:URL>
        <vuln:ProductID>12138</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-28T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="93">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28327</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2023-28327</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="secalert@redhat.com"
        Type="CNA"
        Ordinal="30">secalert@redhat.com</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-28327</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12139</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12140</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28327</vuln:URL>
        <vuln:ProductID>12139</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-dtb-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-5.15.111.1-1.cm2.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>5.15.111.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2023-28327</vuln:URL>
        <vuln:ProductID>12140</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-04-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2023-05-25T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="62">
    <vuln:Title>Secure Boot Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, privileges required is high (PR:H).  What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to compromise admin credentials on the device.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How can an attacker successfully exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To exploit the vulnerability, an attacker who has physical access or Administrative rights to a target device could install an affected boot policy.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What kind of security feature could be bypassed by successfully exploiting this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could bypass Secure Boot.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are there additional steps I need to take to be protected from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The security update addresses the vulnerability by updating the Windows Boot Manager, but is not enabled by default. Additional steps are required at this time to mitigate the vulnerability. Please refer to the following for steps to determine impact on your environment: &lt;a href="https://support.microsoft.com/help/5025885"&gt;KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932&lt;/a&gt;.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;I am running Window 11 23H2 or Server 2022, 23H2 Edition, What do I need to do to be protected from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Protections for the Secure Boot bypass were included in Windows 11 Version 23H3 and Windows Server 2022, 23H2 Edition at the time of their release; however, these protections are not enabled by default. Customers running these versions of Windows must enable the protections as outlined in &lt;a href="https://support.microsoft.com/help/5025885"&gt;KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932&lt;/a&gt;.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Secure Boot"
        Type="Tag"
        Ordinal="20">Windows Secure Boot</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-24932</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:Yes;Exploited:Yes;Latest Software Release:Exploitation Detected;DOS:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11570</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11801</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11802</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11926</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11927</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062553</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062553</vuln:URL>
        <vuln:Supercedence>5060842</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062553</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062553</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062553</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062553</vuln:URL>
        <vuln:Supercedence>5060842</vuln:Supercedence>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.0.26200.4652</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062553</vuln:URL>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062553</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062557</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062557</vuln:URL>
        <vuln:Supercedence>5060531</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7558</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062557</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062557</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5040430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5040430</vuln:URL>
        <vuln:Supercedence>5039217</vuln:Supercedence>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.6054</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5040430</vuln:URL>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5040430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5040430</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5040430</vuln:URL>
        <vuln:ProductID>11570</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062572</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062572</vuln:URL>
        <vuln:Supercedence>5060526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3932</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062572</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062572</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5026361</vuln:URL>
        <vuln:Supercedence>5025221</vuln:Supercedence>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19042.2965</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5026361</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5026361</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5026361</vuln:URL>
        <vuln:ProductID>11801</vuln:ProductID>
        <vuln:ProductID>11802</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5040431</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5040431</vuln:URL>
        <vuln:Supercedence>5039213</vuln:Supercedence>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22000.3079</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5040431</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5040431</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5040431</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5040431</vuln:URL>
        <vuln:ProductID>11926</vuln:ProductID>
        <vuln:ProductID>11927</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062554</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062554</vuln:URL>
        <vuln:Supercedence>5060533</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.6093</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062554</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062554</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5062554</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5062554</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062552</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062552</vuln:URL>
        <vuln:Supercedence>5060999</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5624</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062552</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062552</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062554</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062554</vuln:URL>
        <vuln:Supercedence>5060533</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.6093</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062554</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062554</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062552</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062552</vuln:URL>
        <vuln:Supercedence>5060999</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5624</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062552</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062552</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062570</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062570</vuln:URL>
        <vuln:Supercedence>5060118</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1732</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062570</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062570</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062561</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062561</vuln:URL>
        <vuln:Supercedence>5060998</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21073</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062561</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062561</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062560</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062560</vuln:URL>
        <vuln:Supercedence>5061010</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8246</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062560</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062560</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062624</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062624</vuln:URL>
        <vuln:Supercedence>5061026</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23418</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062624</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062624</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5062624</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5062624</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062618</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062618</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23418</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062618</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062618</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5062618</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5062618</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062632</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062632</vuln:URL>
        <vuln:Supercedence>5061078</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27820</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062632</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062632</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062619</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062619</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27820</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062619</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062619</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062592</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062592</vuln:URL>
        <vuln:Supercedence>5061059</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25573</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062592</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062592</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5062597</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5062597</vuln:URL>
        <vuln:Supercedence>5061018</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22676</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5062597</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5062597</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Tomer Sne-or with SentinelOne</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Martin Smolar with ESET</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Zammis Clark</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.2</cvrf:Number>
        <cvrf:Date>2023-07-18T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Removed the Security Hotpatch Update for the July 2023 revision as that package doesn't exist for this release cycle. You must install the Security Update to get the updated software.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2024-07-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated the Security Updates table to include the July 9, 2024 updates. These updates include support for opting into an updated Secure Version Number to block older boot managers.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2025-02-11T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;The following updates have been made to CVE-2023-24932: 1) In the Security Updates table, added all supported versions of the following as they are affected by this vulnerability: Windows 11 24H2 and Windows Server 2025. 2) Further, to comprehensively address this vulnerability, Microsoft has released February 2025 security updates for all affected versions of Windows 11 version 22H2 and Windows 11 version 23H2.&lt;/p&gt;
&lt;p&gt;Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2025-07-10T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft has released July 8, 2025 security updates for all supported versions of Windows that provide new mitigations to protect against this vulnerability; however, these mitigations are not enabled by default. After you have installed the updates, follow the steps outlined in &lt;a href="https://support.microsoft.com/help/5025885"&gt;KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932&lt;/a&gt; to enable these protections.&lt;/p&gt;
&lt;p&gt;All Windows devices should have the the July 8, 2025 security updates installed regardless of your plan to enable the mitigations.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2023-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2023-07-11T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;In the Security Updates table, added all supported versions of all supported versions of .NET Framework, Visual Studio 2022 version 17.0, Visual Studio 2022 version 17.2, and Visual Studio 2022 version 17.4 because these products are also affected by this vulnerability. Microsoft strongly recommends that customers running any of these products install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2023-07-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;CORRECTED REVISION: To comprehensively address CVE-2023-24932, Microsoft has released July 2023 security updates for all affected versions of Microsoft Windows. Microsoft strongly recommends that customers install the updates to be fully protected from the vulnerability. Additional steps are required after the update is installed. See  &lt;a href="https://support.microsoft.com/help/5025885"&gt;KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932&lt;/a&gt; for more information.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.3</cvrf:Number>
        <cvrf:Date>2024-01-26T08:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated FAQs to include information on how to be protected from this vulnerability for customers running Windows 11 23H2 or Windows Server 2022, 23H2 Edition. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2024-04-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;In the Security Updates table, added Windows 11 version 23H2 for x64-based systems and Windows 11 version 23H2 for ARM-based systems because the April 2024 security updates provide the latest mitigations. Note that these mitigations are off by default. Customers who should take additional steps to implement security mitigations for a publicly disclosed Secure Boot bypass leveraged by the BlackLotus UEFI bootkit and who would like to take a proactive security stance or to begin preparing for the rollout, please refer to &lt;a href="https://support.microsoft.com/help/5025885"&gt;KB5025885: How to manage the Windows Boot Manager revocations for Secure Boot changes associated with CVE-2023-24932 - Microsoft Support&lt;/a&gt;.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
</cvrf:cvrfdoc>