<cvrf:cvrfdoc
  xmlns:vuln="http://www.icasi.org/CVRF/schema/vuln/1.1"
  xmlns:dc="http://purl.org/dc/elements/1.1/"
  xmlns:cvrf-common="http://www.icasi.org/CVRF/schema/common/1.1"
  xmlns:prod="http://www.icasi.org/CVRF/schema/prod/1.1"
  xmlns:scap-core="https://scap.nist.gov/schema/scap-core/1.0"
  xmlns:cvssv2="https://scap.nist.gov/schema/cvss-v2/1.0"
  xmlns:cpe-lang="http://cpe.mitre.org/language/2.0"
  xmlns:sch="http://purl.oclc.org/dsdl/schematron"
  xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <cvrf:DocumentTitle>May 2025 Security Updates</cvrf:DocumentTitle>
  <cvrf:DocumentType>Security Update</cvrf:DocumentType>
  <cvrf:DocumentPublisher
    Type="Vendor">
    <cvrf:ContactDetails>secure@microsoft.com</cvrf:ContactDetails>
    <cvrf:IssuingAuthority>The Microsoft Security Response Center (MSRC) identifies, monitors, resolves, and responds to security incidents and Microsoft software security vulnerabilities. For more information, see http://www.microsoft.com/security/msrc.</cvrf:IssuingAuthority>
  </cvrf:DocumentPublisher>
  <cvrf:DocumentTracking>
    <cvrf:Identification>
      <cvrf:ID>2025-May</cvrf:ID>
      <cvrf:Alias>2025-May</cvrf:Alias>
    </cvrf:Identification>
    <cvrf:Status>Final</cvrf:Status>
    <cvrf:Version>1.0</cvrf:Version>
    <cvrf:RevisionHistory>
      <cvrf:Revision>
        <cvrf:Number>555</cvrf:Number>
        <cvrf:Date>2026-05-17T14:48:41</cvrf:Date>
        <cvrf:Description>May 2025 Security Updates</cvrf:Description>
      </cvrf:Revision>
    </cvrf:RevisionHistory>
    <cvrf:InitialReleaseDate>2025-05-13T07:00:00</cvrf:InitialReleaseDate>
    <cvrf:CurrentReleaseDate>2026-05-17T14:48:41</cvrf:CurrentReleaseDate>
  </cvrf:DocumentTracking>
  <cvrf:DocumentNotes>
    <cvrf:Note
      Title="Release Notes"
      Audience="Public"
      Type="Details"
      Ordinal="0">&lt;h2 id="this-release-consists-of-the-following-80-microsoft-cves"&gt;This release consists of the following 80 Microsoft CVEs:&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tag&lt;/th&gt;
&lt;th&gt;CVE&lt;/th&gt;
&lt;th&gt;Base Score&lt;/th&gt;
&lt;th&gt;CVSS Vector&lt;/th&gt;
&lt;th&gt;Exploitability&lt;/th&gt;
&lt;th&gt;FAQs?&lt;/th&gt;
&lt;th&gt;Workarounds?&lt;/th&gt;
&lt;th&gt;Mitigations?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Visual Studio Code&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-21264"&gt;CVE-2025-21264&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.1&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Kernel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-24063"&gt;CVE-2025-24063&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;.NET, Visual Studio, and Build Tools for Visual Studio&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26646"&gt;CVE-2025-26646&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Remote Desktop Gateway Service&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26677"&gt;CVE-2025-26677&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Defender for Endpoint&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26684"&gt;CVE-2025-26684&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.7&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Defender for Identity&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-26685"&gt;CVE-2025-26685&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Secure Kernel Mode&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27468"&gt;CVE-2025-27468&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Hardware Lab Kit&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-27488"&gt;CVE-2025-27488&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.7&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Azure DevOps&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29813"&gt;CVE-2025-29813&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;10.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29825"&gt;CVE-2025-29825&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Dataverse&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29826"&gt;CVE-2025-29826&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.3&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Azure Automation&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29827"&gt;CVE-2025-29827&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;9.9&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:P/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Trusted Runtime Interface Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29829"&gt;CVE-2025-29829&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Routing and Remote Access Service (RRAS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29830"&gt;CVE-2025-29830&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Remote Desktop Gateway Service&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29831"&gt;CVE-2025-29831&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Routing and Remote Access Service (RRAS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29832"&gt;CVE-2025-29832&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Virtual Machine Bus&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29833"&gt;CVE-2025-29833&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.7&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Routing and Remote Access Service (RRAS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29835"&gt;CVE-2025-29835&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Routing and Remote Access Service (RRAS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29836"&gt;CVE-2025-29836&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Installer&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29837"&gt;CVE-2025-29837&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Drivers&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29838"&gt;CVE-2025-29838&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.4&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows File Server&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29839"&gt;CVE-2025-29839&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;4.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Media&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29840"&gt;CVE-2025-29840&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Universal Print Management Service&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29841"&gt;CVE-2025-29841&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;UrlMon&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29842"&gt;CVE-2025-29842&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows LDAP - Lightweight Directory Access Protocol&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29954"&gt;CVE-2025-29954&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.9&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Role: Windows Hyper-V&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29955"&gt;CVE-2025-29955&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.2&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows SMB&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29956"&gt;CVE-2025-29956&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.4&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Deployment Services&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29957"&gt;CVE-2025-29957&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.2&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Routing and Remote Access Service (RRAS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29958"&gt;CVE-2025-29958&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Routing and Remote Access Service (RRAS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29959"&gt;CVE-2025-29959&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Routing and Remote Access Service (RRAS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29960"&gt;CVE-2025-29960&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Routing and Remote Access Service (RRAS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29961"&gt;CVE-2025-29961&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Media&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29962"&gt;CVE-2025-29962&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Media&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29963"&gt;CVE-2025-29963&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Media&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29964"&gt;CVE-2025-29964&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Remote Desktop&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29966"&gt;CVE-2025-29966&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Remote Desktop Gateway Service&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29967"&gt;CVE-2025-29967&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Active Directory Certificate Services (AD CS)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29968"&gt;CVE-2025-29968&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;6.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Fundamentals&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29969"&gt;CVE-2025-29969&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Brokering File System&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29970"&gt;CVE-2025-29970&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Web Threat Defense (WTD.sys)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29971"&gt;CVE-2025-29971&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Azure Storage Resource Provider&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29972"&gt;CVE-2025-29972&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;9.9&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Azure File Sync&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29973"&gt;CVE-2025-29973&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Kernel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29974"&gt;CVE-2025-29974&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.7&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft PC Manager&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29975"&gt;CVE-2025-29975&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office SharePoint&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29976"&gt;CVE-2025-29976&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29977"&gt;CVE-2025-29977&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office PowerPoint&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29978"&gt;CVE-2025-29978&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-29979"&gt;CVE-2025-29979&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30375"&gt;CVE-2025-30375&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30376"&gt;CVE-2025-30376&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30377"&gt;CVE-2025-30377&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.4&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office SharePoint&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30378"&gt;CVE-2025-30378&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.0&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30379"&gt;CVE-2025-30379&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30381"&gt;CVE-2025-30381&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office SharePoint&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30382"&gt;CVE-2025-30382&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30383"&gt;CVE-2025-30383&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office SharePoint&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30384"&gt;CVE-2025-30384&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.4&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Common Log File System Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30385"&gt;CVE-2025-30385&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30386"&gt;CVE-2025-30386&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.4&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Azure&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30387"&gt;CVE-2025-30387&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;9.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Win32K - GRFX&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30388"&gt;CVE-2025-30388&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation More Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30393"&gt;CVE-2025-30393&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Remote Desktop Gateway Service&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30394"&gt;CVE-2025-30394&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.9&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Scripting Engine&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30397"&gt;CVE-2025-30397&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Detected&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows DWM&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-30400"&gt;CVE-2025-30400&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Detected&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Common Log File System Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32701"&gt;CVE-2025-32701&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Detected&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Visual Studio&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32702"&gt;CVE-2025-32702&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Visual Studio&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32703"&gt;CVE-2025-32703&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;5.5&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Excel&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32704"&gt;CVE-2025-32704&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.4&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Office Outlook&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32705"&gt;CVE-2025-32705&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Common Log File System Driver&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32706"&gt;CVE-2025-32706&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Detected&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows NTFS&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32707"&gt;CVE-2025-32707&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Windows Ancillary Function Driver for WinSock&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-32709"&gt;CVE-2025-32709&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Detected&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Azure&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-33072"&gt;CVE-2025-33072&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.1&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Less Likely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47161"&gt;CVE-2025-47161&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;7.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47181"&gt;CVE-2025-47181&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.8&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;Exploitation Unlikely&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Dataverse&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47732"&gt;CVE-2025-47732&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;8.7&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Microsoft Power Apps&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47733"&gt;CVE-2025-47733&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;9.1&lt;/td&gt;
&lt;td&gt;CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C&lt;/td&gt;
&lt;td&gt;N/A&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="we-are-republishing-15-non-microsoft-cves"&gt;We are republishing 15 non-Microsoft CVEs:&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;CNA&lt;/th&gt;
&lt;th&gt;Tag&lt;/th&gt;
&lt;th&gt;CVE&lt;/th&gt;
&lt;th&gt;FAQs?&lt;/th&gt;
&lt;th&gt;Workarounds?&lt;/th&gt;
&lt;th&gt;Mitigations?&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-4050"&gt;CVE-2025-4050&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-4051"&gt;CVE-2025-4051&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-4052"&gt;CVE-2025-4052&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-4096"&gt;CVE-2025-4096&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-4372"&gt;CVE-2025-4372&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-4609"&gt;CVE-2025-4609&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-4664"&gt;CVE-2025-4664&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-5063"&gt;CVE-2025-5063&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-5064"&gt;CVE-2025-5064&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-5065"&gt;CVE-2025-5065&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-5066"&gt;CVE-2025-5066&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-5067"&gt;CVE-2025-5067&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-5280"&gt;CVE-2025-5280&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-5281"&gt;CVE-2025-5281&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Chrome&lt;/td&gt;
&lt;td&gt;Microsoft Edge (Chromium-based)&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-5283"&gt;CVE-2025-5283&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Yes&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="security-update-guide-blog-posts"&gt;Security Update Guide Blog Posts&lt;/h2&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Date&lt;/th&gt;
&lt;th&gt;Blog Post&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;November 12, 2024&lt;/td&gt;
&lt;td&gt;&lt;a href="https://aka.ms/MSRC-CSAF-Blog"&gt;Toward greater transparency: Publishing machine-readable CSAF files&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;June 27, 2024&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/blog/2024/06/toward-greater-transparency-unveiling-cloud-service-cves/"&gt;Toward greater transparency: Unveiling Cloud Service CVEs&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;April 9, 2024&lt;/td&gt;
&lt;td&gt;&lt;a href="https://aka.ms/MSRC-CWE-Blog"&gt;Toward greater transparency: Security Update Guide now shares CWEs for CVEs&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;January 6, 2023&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc.microsoft.com/blog/2023/01/publishing-cbl-mariner-cves-on-the-security-update-guide-cvrf-api/"&gt;Publishing CBL-Mariner CVEs on the Security Update Guide CVRF API&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;January 11, 2022&lt;/td&gt;
&lt;td&gt;&lt;a href="https://aka.ms/SUGNotificationProfile"&gt;Coming Soon: New Security Update Guide Notification System&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;February 9, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/02/09/continuing-to-listen-good-news-about-the-security-update-guide-api/"&gt;Continuing to Listen: Good News about the Security Update Guide API&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;January 13, 2021&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2021/01/13/security-update-guide-supports-cves-assigned-by-industry-partners/"&gt;Security Update Guide Supports CVEs Assigned by Industry Partners&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;December 8, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/12/08/security-update-guide-lets-keep-the-conversation-going/"&gt;Security Update Guide: Let’s keep the conversation going&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;November 9, 2020&lt;/td&gt;
&lt;td&gt;&lt;a href="https://msrc-blog.microsoft.com/2020/11/09/vulnerability-descriptions-in-the-new-version-of-the-security-update-guide/"&gt;Vulnerability Descriptions in the New Version of the Security Update Guide&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="relevant-resources"&gt;Relevant Resources&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;The new Hotpatching feature is now generally available. Please see &lt;a href="https://docs.microsoft.com/en-us/azure/automanage/automanage-hotpatch?WT.mc_id=modinfra-18529-thmaure"&gt;Hotpatching feature for Windows Server Azure Edition virtual machines (VMs)&lt;/a&gt; for more information.&lt;/li&gt;
&lt;li&gt;Windows 10 and Windows 11 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10 and Windows 11, in addition to non-security updates. The updates are available via the &lt;a href="https://www.catalog.update.microsoft.com/Home.aspx"&gt;Microsoft Update Catalog&lt;/a&gt;. For information on lifecycle and support dates for Windows 10  and Windows 11 operating systems, please see &lt;a href="https://docs.microsoft.com/en-us/lifecycle/faq/windows"&gt;Windows Lifecycle Facts Sheet&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Microsoft is improving Windows Release Notes. For more information, please see &lt;a href="https://techcommunity.microsoft.com/t5/windows-it-pro-blog/what-s-next-for-windows-release-notes/ba-p/1754399"&gt;What's next for Windows release notes&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;A list of the latest servicing stack updates for each operating system can be found in &lt;a href="https://msrc.microsoft.com/update-guide/en-us/vulnerability/ADV990001"&gt;ADV990001&lt;/a&gt;. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.&lt;/li&gt;
&lt;li&gt;In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.&lt;/li&gt;
&lt;li&gt;Customers running Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See &lt;a href="https://support.microsoft.com/en-us/topic/procedure-to-continue-receiving-security-updates-after-extended-support-ends-on-january-14-2020-48c59204-fe67-3f42-84fc-c3c3145ff28e"&gt;4522133&lt;/a&gt; for more information.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="known-issues"&gt;Known Issues&lt;/h2&gt;
&lt;p&gt;You can see these in more detail from the Deployments tab by selecting &lt;strong&gt;Known Issues&lt;/strong&gt; column in the &lt;strong&gt;Edit Columns&lt;/strong&gt; panel.&lt;/p&gt;
&lt;p&gt;For more information about Windows Known Issues, please see &lt;a href="https://docs.microsoft.com/en-us/windows/release-information/windows-message-center"&gt;Windows message center&lt;/a&gt; (links to currently-supported versions of Windows are in the left pane).&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;KB Article&lt;/th&gt;
&lt;th&gt;Applies To&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5058379"&gt;5058379&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, version 21H2, Windows 10, version 22H2&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5058392"&gt;5058392&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows 10, version 1809, Windows Server 2019&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5058429"&gt;5058429&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 (Security-only update)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://support.microsoft.com/help/5058449"&gt;5058449&lt;/a&gt;&lt;/td&gt;
&lt;td&gt;Windows Server 2008 (Monthly Rollup)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</cvrf:Note>
    <cvrf:Note
      Title="Legal Disclaimer"
      Audience="Public"
      Type="Legal Disclaimer"
      Ordinal="1">The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.</cvrf:Note>
  </cvrf:DocumentNotes>
  <prod:ProductTree>
    <prod:Branch
      Type="Vendor"
      Name="Microsoft">
      <prod:Branch
        Type="Product Family"
        Name="Browser">
        <prod:FullProductName
          ProductID="11655">Microsoft Edge (Chromium-based)</prod:FullProductName>
        <prod:FullProductName
          ProductID="12101">Microsoft Edge (Chromium-based) Updater</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Developer Tools">
        <prod:FullProductName
          ProductID="12414">.NET 8.0 installed on Windows</prod:FullProductName>
        <prod:FullProductName
          ProductID="12415">.NET 8.0 installed on Linux</prod:FullProductName>
        <prod:FullProductName
          ProductID="12416">.NET 8.0 installed on Mac OS</prod:FullProductName>
        <prod:FullProductName
          ProductID="12432">.NET 9.0 installed on Linux</prod:FullProductName>
        <prod:FullProductName
          ProductID="12433">.NET 9.0 installed on Mac OS</prod:FullProductName>
        <prod:FullProductName
          ProductID="12434">.NET 9.0 installed on Windows</prod:FullProductName>
        <prod:FullProductName
          ProductID="12459">Microsoft Visual Studio 2022 version 17.12</prod:FullProductName>
        <prod:FullProductName
          ProductID="12506">Microsoft Visual Studio 2022 version 17.13</prod:FullProductName>
        <prod:FullProductName
          ProductID="12271">Microsoft Visual Studio 2022 version 17.8</prod:FullProductName>
        <prod:FullProductName
          ProductID="12322">Microsoft Visual Studio 2022 version 17.10</prod:FullProductName>
        <prod:FullProductName
          ProductID="16763">Build Tools for Visual Studio 2022</prod:FullProductName>
        <prod:FullProductName
          ProductID="11600">Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11935">Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11622">Visual Studio Code</prod:FullProductName>
        <prod:FullProductName
          ProductID="16782">Microsoft Visual Studio Code CoPilot Chat Extension</prod:FullProductName>
        <prod:FullProductName
          ProductID="11998">Azure DevOps</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="System Center">
        <prod:FullProductName
          ProductID="12015">Microsoft Defender for Endpoint for Linux</prod:FullProductName>
        <prod:FullProductName
          ProductID="12512">Microsoft Defender for Identity</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Windows">
        <prod:FullProductName
          ProductID="11568">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11569">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11571">Windows Server 2019</prod:FullProductName>
        <prod:FullProductName
          ProductID="11572">Windows Server 2019 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11923">Windows Server 2022</prod:FullProductName>
        <prod:FullProductName
          ProductID="11924">Windows Server 2022 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11929">Windows 10 Version 21H2 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11930">Windows 10 Version 21H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11931">Windows 10 Version 21H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12437">Windows Server 2025 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="12242">Windows 11 Version 23H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12243">Windows 11 Version 23H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12244">Windows Server 2022, 23H2 Edition (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="12389">Windows 11 Version 24H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12390">Windows 11 Version 24H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12436">Windows Server 2025</prod:FullProductName>
        <prod:FullProductName
          ProductID="10729">Windows 10 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10735">Windows 10 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10852">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10853">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="10816">Windows Server 2016</prod:FullProductName>
        <prod:FullProductName
          ProductID="10855">Windows Server 2016 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="12457">Windows App Client for Windows Desktop</prod:FullProductName>
        <prod:FullProductName
          ProductID="11849">Remote Desktop client for Windows Desktop</prod:FullProductName>
        <prod:FullProductName
          ProductID="16752">Windows HLK for Windows Server 2025</prod:FullProductName>
        <prod:FullProductName
          ProductID="16753">Windows 11 HLK 24H2</prod:FullProductName>
        <prod:FullProductName
          ProductID="16756">Windows HLK, version 1809</prod:FullProductName>
        <prod:FullProductName
          ProductID="16759">Windows 10 HLK version 21H1</prod:FullProductName>
        <prod:FullProductName
          ProductID="16751">Windows 11 HLK 22H2</prod:FullProductName>
        <prod:FullProductName
          ProductID="16760">Windows 10 HLK version 20H2</prod:FullProductName>
        <prod:FullProductName
          ProductID="16757">Windows 10 HLK Version 22H2</prod:FullProductName>
        <prod:FullProductName
          ProductID="16758">Windows 10 HLK version 21H2</prod:FullProductName>
        <prod:FullProductName
          ProductID="16761">Windows HLK for Windows 10 version 2004</prod:FullProductName>
        <prod:FullProductName
          ProductID="16755">Windows HLK for Windows Server 2019</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="ESU">
        <prod:FullProductName
          ProductID="12085">Windows 11 Version 22H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12086">Windows 11 Version 22H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12097">Windows 10 Version 22H2 for x64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12098">Windows 10 Version 22H2 for ARM64-based Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="12099">Windows 10 Version 22H2 for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="9312">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
        <prod:FullProductName
          ProductID="10287">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="9318">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
        <prod:FullProductName
          ProductID="9344">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10051">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
        <prod:FullProductName
          ProductID="10049">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10378">Windows Server 2012</prod:FullProductName>
        <prod:FullProductName
          ProductID="10379">Windows Server 2012 (Server Core installation)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10483">Windows Server 2012 R2</prod:FullProductName>
        <prod:FullProductName
          ProductID="10543">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Azure">
        <prod:FullProductName
          ProductID="16746">Azure File Sync v19</prod:FullProductName>
        <prod:FullProductName
          ProductID="16747">Azure File Sync v20</prod:FullProductName>
        <prod:FullProductName
          ProductID="16741">Azure AI Document Intelligence Studio</prod:FullProductName>
        <prod:FullProductName
          ProductID="16744">Microsoft msagsfeedback.azurewebsites.net</prod:FullProductName>
        <prod:FullProductName
          ProductID="16754">Windows HLK for Windows Server 2022</prod:FullProductName>
        <prod:FullProductName
          ProductID="16750">Azure Storage Resource Provider (SRP)</prod:FullProductName>
        <prod:FullProductName
          ProductID="11656">Azure Automation</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Apps">
        <prod:FullProductName
          ProductID="12441">Microsoft PC Manager</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Microsoft Office">
        <prod:FullProductName
          ProductID="10950">Microsoft SharePoint Enterprise Server 2016</prod:FullProductName>
        <prod:FullProductName
          ProductID="11585">Microsoft SharePoint Server 2019</prod:FullProductName>
        <prod:FullProductName
          ProductID="11961">Microsoft SharePoint Server Subscription Edition</prod:FullProductName>
        <prod:FullProductName
          ProductID="10836">Office Online Server</prod:FullProductName>
        <prod:FullProductName
          ProductID="11573">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11574">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11762">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11763">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
        <prod:FullProductName
          ProductID="11951">Microsoft Office LTSC for Mac 2021</prod:FullProductName>
        <prod:FullProductName
          ProductID="11952">Microsoft Office LTSC 2021 for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="11953">Microsoft Office LTSC 2021 for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="12420">Microsoft Office LTSC 2024 for 32-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="12421">Microsoft Office LTSC 2024 for 64-bit editions</prod:FullProductName>
        <prod:FullProductName
          ProductID="12440">Microsoft Office LTSC for Mac 2024</prod:FullProductName>
        <prod:FullProductName
          ProductID="10739">Microsoft Excel 2016 (32-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10740">Microsoft Excel 2016 (64-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10753">Microsoft Office 2016 (32-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="10754">Microsoft Office 2016 (64-bit edition)</prod:FullProductName>
        <prod:FullProductName
          ProductID="12155">Microsoft Office for Android</prod:FullProductName>
        <prod:FullProductName
          ProductID="12156">Microsoft Office for Universal</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Microsoft Dynamics">
        <prod:FullProductName
          ProductID="12338">Microsoft Dataverse</prod:FullProductName>
        <prod:FullProductName
          ProductID="12497">Microsoft Power Pages</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Mariner">
        <prod:FullProductName
          ProductID="17458-17084">azl3 syslog-ng 4.3.1-3 on Azure Linux 3.0</prod:FullProductName>
      </prod:Branch>
      <prod:Branch
        Type="Product Family"
        Name="Open Source Software">
        <prod:FullProductName
          ProductID="20245-17086">cbl2 syslog-ng 3.33.2-8 on CBL Mariner 2.0</prod:FullProductName>
      </prod:Branch>
    </prod:Branch>
    <prod:FullProductName
      ProductID="10049"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27729:*:*:*:*:*:x64:*">Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10051"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27729:*:*:*:*:*:x64:*">Windows Server 2008 R2 for x64-based Systems Service Pack 1</prod:FullProductName>
    <prod:FullProductName
      ProductID="10287"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23279:*:*:*:*:*:x64:*">Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10378"
      CPE="cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25475:*:*:*:*:*:x64:*">Windows Server 2012</prod:FullProductName>
    <prod:FullProductName
      ProductID="10379"
      CPE="cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25475:*:*:*:*:*:x64:*">Windows Server 2012 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10483"
      CPE="cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22577:*:*:*:*:*:x64:*">Windows Server 2012 R2</prod:FullProductName>
    <prod:FullProductName
      ProductID="10543"
      CPE="cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22577:*:*:*:*:*:x64:*">Windows Server 2012 R2 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10729"
      CPE="cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.21014:*:*:*:*:*:x86:*">Windows 10 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10735"
      CPE="cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.21014:*:*:*:*:*:x64:*">Windows 10 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10739"
      CPE="cpe:2.3:a:microsoft:excel_2016:*:*:*:*:*:*:x86:*">Microsoft Excel 2016 (32-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10740"
      CPE="cpe:2.3:a:microsoft:excel_2016:*:*:*:*:*:*:x64:*">Microsoft Excel 2016 (64-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10753"
      CPE="cpe:2.3:a:microsoft:office_2016:*:*:*:*:*:*:x86:*">Microsoft Office 2016 (32-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10754"
      CPE="cpe:2.3:a:microsoft:office_2016:*:*:*:*:*:*:x64:*">Microsoft Office 2016 (64-bit edition)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10816"
      CPE="cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.8066:*:*:*:*:*:*:*">Windows Server 2016</prod:FullProductName>
    <prod:FullProductName
      ProductID="10836"
      CPE="cpe:2.3:a:microsoft:office_2021:*:*:*:*:ltsc:*:*:*">Office Online Server</prod:FullProductName>
    <prod:FullProductName
      ProductID="10852"
      CPE="cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.8066:*:*:*:*:*:x86:*">Windows 10 Version 1607 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10853"
      CPE="cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.8066:*:*:*:*:*:x64:*">Windows 10 Version 1607 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="10855"
      CPE="cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.8066:*:*:*:*:*:*:*">Windows Server 2016 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="10950"
      CPE="cpe:2.3:a:microsoft:sharepoint_server_2016:*:*:*:*:enterprise:*:*:*">Microsoft SharePoint Enterprise Server 2016</prod:FullProductName>
    <prod:FullProductName
      ProductID="11568"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7314:*:*:*:*:*:x86:*">Windows 10 Version 1809 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11569"
      CPE="cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.7314:*:*:*:*:*:x64:*">Windows 10 Version 1809 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11571"
      CPE="cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7314:*:*:*:*:*:*:*">Windows Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="11572"
      CPE="cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.7314:*:*:*:*:*:*:*">Windows Server 2019 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11573"
      CPE="cpe:2.3:a:microsoft:office_2019:*:*:*:*:*:*:*:*">Microsoft Office 2019 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11574"
      CPE="cpe:2.3:a:microsoft:office_2019:*:*:*:*:*:*:*:*">Microsoft Office 2019 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11585"
      CPE="cpe:2.3:a:microsoft:sharepoint_server_2019:*:*:*:*:*:*:*:*">Microsoft SharePoint Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="11600"
      CPE="cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*">Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11622"
      CPE="cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:*:*:*">Visual Studio Code</prod:FullProductName>
    <prod:FullProductName
      ProductID="11655"
      CPE="cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*">Microsoft Edge (Chromium-based)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11656"
      CPE="cpe:2.3:a:microsoft:azure_automation:-:*:*:*:*:*:*:*">Azure Automation</prod:FullProductName>
    <prod:FullProductName
      ProductID="11762"
      CPE="cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*">Microsoft 365 Apps for Enterprise for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11763"
      CPE="cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:*">Microsoft 365 Apps for Enterprise for 64-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11849"
      CPE="cpe:2.3:a:microsoft:remote_desktop:-:*:*:*:*:windows:*:*">Remote Desktop client for Windows Desktop</prod:FullProductName>
    <prod:FullProductName
      ProductID="11923"
      CPE="cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3692:*:*:*:*:*:*:*">Windows Server 2022</prod:FullProductName>
    <prod:FullProductName
      ProductID="11924"
      CPE="cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.3692:*:*:*:*:*:*:*">Windows Server 2022 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11929"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5854:*:*:*:*:*:x86:*">Windows 10 Version 21H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11930"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5854:*:*:*:*:*:arm64:*">Windows 10 Version 21H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11931"
      CPE="cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.5854:*:*:*:*:*:x64:*">Windows 10 Version 21H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="11935"
      CPE="cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*">Microsoft Visual Studio 2019 version 16.11 (includes 16.0 - 16.10)</prod:FullProductName>
    <prod:FullProductName
      ProductID="11951"
      CPE="cpe:2.3:a:microsoft:office_macos_2021:*:*:*:*:*:long_term_servicing_channel:*:*">Microsoft Office LTSC for Mac 2021</prod:FullProductName>
    <prod:FullProductName
      ProductID="11952"
      CPE="cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*">Microsoft Office LTSC 2021 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11953"
      CPE="cpe:2.3:a:microsoft:office_2021:*:*:*:*:long_term_servicing_channel:*:*:*">Microsoft Office LTSC 2021 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="11961"
      CPE="cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*">Microsoft SharePoint Server Subscription Edition</prod:FullProductName>
    <prod:FullProductName
      ProductID="11998"
      CPE="cpe:2.3:a:microsoft:azure_devops:-:*:*:*:*:*:*:*">Azure DevOps</prod:FullProductName>
    <prod:FullProductName
      ProductID="12015"
      CPE="cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:*:*:*">Microsoft Defender for Endpoint for Linux</prod:FullProductName>
    <prod:FullProductName
      ProductID="12085"
      CPE="cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5335:*:*:*:*:*:arm64:*">Windows 11 Version 22H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12086"
      CPE="cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.5335:*:*:*:*:*:x64:*">Windows 11 Version 22H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12097"
      CPE="cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5854:*:*:*:*:*:x64:*">Windows 10 Version 22H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12098"
      CPE="cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5854:*:*:*:*:*:arm64:*">Windows 10 Version 22H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12099"
      CPE="cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.5854:*:*:*:*:*:x86:*">Windows 10 Version 22H2 for 32-bit Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12101"
      CPE="cpe:2.3:a:microsoft:edge_chromium_updater:*:*:*:*:*:*:*:*">Microsoft Edge (Chromium-based) Updater</prod:FullProductName>
    <prod:FullProductName
      ProductID="12155"
      CPE="cpe:2.3:a:microsoft:office:*:*:android:*:*:*:*:*">Microsoft Office for Android</prod:FullProductName>
    <prod:FullProductName
      ProductID="12156"
      CPE="cpe:2.3:a:microsoft:office:*:*:universal:*:*:*:*:*">Microsoft Office for Universal</prod:FullProductName>
    <prod:FullProductName
      ProductID="12242"
      CPE="cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5335:*:*:*:*:*:arm64:*">Windows 11 Version 23H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12243"
      CPE="cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.5335:*:*:*:*:*:x64:*">Windows 11 Version 23H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12244"
      CPE="cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1611:*:*:*:*:*:*:*">Windows Server 2022, 23H2 Edition (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="12271"
      CPE="cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*">Microsoft Visual Studio 2022 version 17.8</prod:FullProductName>
    <prod:FullProductName
      ProductID="12322"
      CPE="cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*">Microsoft Visual Studio 2022 version 17.10</prod:FullProductName>
    <prod:FullProductName
      ProductID="12338"
      CPE="cpe:2.3:a:microsoft:dataverse:*:*:*:*:*:*:*:*">Microsoft Dataverse</prod:FullProductName>
    <prod:FullProductName
      ProductID="12356"
      CPE="cpe:2.3:a:microsoft:azure_linux:3.0:*:*:*:*:*:*:x64">Azure Linux 3.0 x64</prod:FullProductName>
    <prod:FullProductName
      ProductID="12357"
      CPE="cpe:2.3:a:microsoft:azure_linux:3.0:*:*:*:*:*:*:arm">Azure Linux 3.0 ARM</prod:FullProductName>
    <prod:FullProductName
      ProductID="12389"
      CPE="cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.4061:*:*:*:*:*:arm64:*">Windows 11 Version 24H2 for ARM64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12390"
      CPE="cpe:2.3:o:microsoft:windows_11_24H2:10.0.26100.4061:*:*:*:*:*:x64:*">Windows 11 Version 24H2 for x64-based Systems</prod:FullProductName>
    <prod:FullProductName
      ProductID="12414"
      CPE="cpe:2.3:a:microsoft:.net:8.0.0:*:*:*:*:*:*:*">.NET 8.0 installed on Windows</prod:FullProductName>
    <prod:FullProductName
      ProductID="12415"
      CPE="cpe:2.3:a:microsoft:.net:8.0.0:*:*:*:*:*:*:*">.NET 8.0 installed on Linux</prod:FullProductName>
    <prod:FullProductName
      ProductID="12416"
      CPE="cpe:2.3:a:microsoft:.net:8.0.0:*:*:*:*:*:*:*">.NET 8.0 installed on Mac OS</prod:FullProductName>
    <prod:FullProductName
      ProductID="12420"
      CPE="cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:*">Microsoft Office LTSC 2024 for 32-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="12421"
      CPE="cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:*">Microsoft Office LTSC 2024 for 64-bit editions</prod:FullProductName>
    <prod:FullProductName
      ProductID="12432"
      CPE="cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*">.NET 9.0 installed on Linux</prod:FullProductName>
    <prod:FullProductName
      ProductID="12433"
      CPE="cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*">.NET 9.0 installed on Mac OS</prod:FullProductName>
    <prod:FullProductName
      ProductID="12434"
      CPE="cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*">.NET 9.0 installed on Windows</prod:FullProductName>
    <prod:FullProductName
      ProductID="12436"
      CPE="cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4061:*:*:*:*:*:*:*">Windows Server 2025</prod:FullProductName>
    <prod:FullProductName
      ProductID="12437"
      CPE="cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.4061:*:*:*:*:*:*:*">Windows Server 2025 (Server Core installation)</prod:FullProductName>
    <prod:FullProductName
      ProductID="12440"
      CPE="cpe:2.3:a:microsoft:office_macos_2024:*:*:*:*:*:long_term_servicing_channel:*:*">Microsoft Office LTSC for Mac 2024</prod:FullProductName>
    <prod:FullProductName
      ProductID="12441"
      CPE="cpe:2.3:a:microsoft:pc_manager:*:*:*:*:*:*:*:*">Microsoft PC Manager</prod:FullProductName>
    <prod:FullProductName
      ProductID="12457"
      CPE="cpe:2.3:a:microsoft:windows_app_client_for_windows_desktop:*:*:*:*:*:windows:*:*">Windows App Client for Windows Desktop</prod:FullProductName>
    <prod:FullProductName
      ProductID="12459"
      CPE="cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*">Microsoft Visual Studio 2022 version 17.12</prod:FullProductName>
    <prod:FullProductName
      ProductID="12497"
      CPE="cpe:2.3:a:microsoft:power_pages:*:*:*:*:*:*:*:*">Microsoft Power Pages</prod:FullProductName>
    <prod:FullProductName
      ProductID="12506"
      CPE="cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*">Microsoft Visual Studio 2022 version 17.13</prod:FullProductName>
    <prod:FullProductName
      ProductID="12512"
      CPE="cpe:2.3:a:microsoft:defender_for_identity:-:*:*:*:*:*:*:*">Microsoft Defender for Identity</prod:FullProductName>
    <prod:FullProductName
      ProductID="16741"
      CPE="cpe:2.3:a:microsoft:azure_ai_document_intelligence_studio:-:*:*:*:*:*:*:*">Azure AI Document Intelligence Studio</prod:FullProductName>
    <prod:FullProductName
      ProductID="16744"
      CPE="cpe:2.3:a:microsoft:msagsfeedback_azurewebsites_net:*:*:*:*:*:*:*:*">Microsoft msagsfeedback.azurewebsites.net</prod:FullProductName>
    <prod:FullProductName
      ProductID="16746"
      CPE="cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*">Azure File Sync v19</prod:FullProductName>
    <prod:FullProductName
      ProductID="16747"
      CPE="cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*">Azure File Sync v20</prod:FullProductName>
    <prod:FullProductName
      ProductID="16750"
      CPE="cpe:2.3:a:microsoft:azure_storage_resouce_provider:-:*:*:*:*:*:*:*">Azure Storage Resource Provider (SRP)</prod:FullProductName>
    <prod:FullProductName
      ProductID="16751"
      CPE="cpe:2.3:o:microsoft:windows_11_hlk_22H2:*:*:*:*:*:*:*:*">Windows 11 HLK 22H2</prod:FullProductName>
    <prod:FullProductName
      ProductID="16752"
      CPE="cpe:2.3:o:microsoft:windows_server_hlk_2025:*:*:*:*:*:*:*:*">Windows HLK for Windows Server 2025</prod:FullProductName>
    <prod:FullProductName
      ProductID="16753"
      CPE="cpe:2.3:o:microsoft:windows_11_hlk_24H2:*:*:*:*:*:*:*:*">Windows 11 HLK 24H2</prod:FullProductName>
    <prod:FullProductName
      ProductID="16754"
      CPE="cpe:2.3:o:microsoft:windows_server_hlk_2022:*:*:*:*:*:*:*:*">Windows HLK for Windows Server 2022</prod:FullProductName>
    <prod:FullProductName
      ProductID="16755"
      CPE="cpe:2.3:o:microsoft:windows_server_hlk_2019:*:*:*:*:*:*:*:*">Windows HLK for Windows Server 2019</prod:FullProductName>
    <prod:FullProductName
      ProductID="16756"
      CPE="cpe:2.3:o:microsoft:windows_10_hlk_1809:*:*:*:*:*:*:*:*">Windows HLK, version 1809</prod:FullProductName>
    <prod:FullProductName
      ProductID="16757"
      CPE="cpe:2.3:o:microsoft:windows_10_hlk_22H2:*:*:*:*:*:*:*:*">Windows 10 HLK Version 22H2</prod:FullProductName>
    <prod:FullProductName
      ProductID="16758"
      CPE="cpe:2.3:o:microsoft:windows_10_hlk_21H2:*:*:*:*:*:*:*:*">Windows 10 HLK version 21H2</prod:FullProductName>
    <prod:FullProductName
      ProductID="16759"
      CPE="cpe:2.3:o:microsoft:windows_10_hlk_21H1:*:*:*:*:*:*:*:*">Windows 10 HLK version 21H1</prod:FullProductName>
    <prod:FullProductName
      ProductID="16760"
      CPE="cpe:2.3:o:microsoft:windows_10_hlk_20H2:*:*:*:*:*:*:*:*">Windows 10 HLK version 20H2</prod:FullProductName>
    <prod:FullProductName
      ProductID="16761"
      CPE="cpe:2.3:o:microsoft:windows_10_hlk_2004:*:*:*:*:*:*:*:*">Windows HLK for Windows 10 version 2004</prod:FullProductName>
    <prod:FullProductName
      ProductID="16763"
      CPE="cpe:2.3:a:microsoft:build_tools_for_visual_studio_2022:*:*:*:*:*:*:*:*">Build Tools for Visual Studio 2022</prod:FullProductName>
    <prod:FullProductName
      ProductID="16782"
      CPE="cpe:2.3:a:microsoft:visual_studio_code_copilot_chat_extension:-:*:*:*:*:*:*:*">Microsoft Visual Studio Code CoPilot Chat Extension</prod:FullProductName>
    <prod:FullProductName
      ProductID="16928-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libglvnd_1.7.0-2:*:*:*:*:*:*:*:*">azl3 libglvnd 1.7.0-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17085-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.96.1-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.96.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17087-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.186.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.186.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17153-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_mysql_8.0.41-1:*:*:*:*:*:*:*:*">cbl2 mysql 8.0.41-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17171-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_python-virtualenv_20.26.6-1:*:*:*:*:*:*:*:*">cbl2 python-virtualenv 20.26.6-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17183-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_rust_1.72.0-10:*:*:*:*:*:*:*:*">cbl2 rust 1.72.0-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17336-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_hdf5_1.14.4-1:*:*:*:*:*:*:*:*">cbl2 hdf5 1.14.4-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17348-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_glibc_2.35-7:*:*:*:*:*:*:*:*">cbl2 glibc 2.35-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17458-17084"
      CPE="cpe:2.3:a:microsoft:azl3_syslog-ng_4.3.1-3:*:*:*:*:*:*:*:*">azl3 syslog-ng 4.3.1-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17464-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cmake_3.30.3-6:*:*:*:*:*:*:*:*">azl3 cmake 3.30.3-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17539-17084"
      CPE="cpe:2.3:a:microsoft:azl3_mysql_8.0.41-1:*:*:*:*:*:*:*:*">azl3 mysql 8.0.41-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17604-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python3_3.12.9-1:*:*:*:*:*:*:*:*">azl3 python3 3.12.9-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17667-17084"
      CPE="cpe:2.3:a:microsoft:azl3_tensorflow_2.16.1-9:*:*:*:*:*:*:*:*">azl3 tensorflow 2.16.1-9 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="17741-17084"
      CPE="cpe:2.3:a:microsoft:azl3_hdf5_1.14.4.3-1:*:*:*:*:*:*:*:*">azl3 hdf5 1.14.4.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="18490-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.182.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.182.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19252-17084"
      CPE="cpe:2.3:a:microsoft:azl3_curl_8.11.1-3:*:*:*:*:*:*:*:*">azl3 curl 8.11.1-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19261-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_postgresql_14.16-1:*:*:*:*:*:*:*:*">cbl2 postgresql 14.16-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19262-17084"
      CPE="cpe:2.3:a:microsoft:azl3_postgresql_16.7-1:*:*:*:*:*:*:*:*">azl3 postgresql 16.7-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19407-17084"
      CPE="cpe:2.3:a:microsoft:azl3_pytorch_2.2.2-7:*:*:*:*:*:*:*:*">azl3 pytorch 2.2.2-7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19445-17084"
      CPE="cpe:2.3:a:microsoft:azl3_fluent-bit_3.1.9-4:*:*:*:*:*:*:*:*">azl3 fluent-bit 3.1.9-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19449-17084"
      CPE="cpe:2.3:a:microsoft:azl3_erlang_26.2.5.11-1:*:*:*:*:*:*:*:*">azl3 erlang 26.2.5.11-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19458-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-setuptools_69.0.3-5:*:*:*:*:*:*:*:*">azl3 python-setuptools 69.0.3-5 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19525-17084"
      CPE="cpe:2.3:a:microsoft:azl3_yasm_1.3.0-17:*:*:*:*:*:*:*:*">azl3 yasm 1.3.0-17 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19526-17084"
      CPE="cpe:2.3:a:microsoft:azl3_jq_1.7.1-3:*:*:*:*:*:*:*:*">azl3 jq 1.7.1-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19529-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.92.2-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.92.2-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19533-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_python3_3.9.19-14:*:*:*:*:*:*:*:*">cbl2 python3 3.9.19-14 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19535-16823"
      CPE="cpe:2.3:a:microsoft:cm2_jq_1.6-3:*:*:*:*:*:*:*:*">cm2 jq 1.6-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19551-16823"
      CPE="cpe:2.3:a:microsoft:cm2_libsoup_3.0.4-7:*:*:*:*:*:*:*:*">cm2 libsoup 3.0.4-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19554-16823"
      CPE="cpe:2.3:a:microsoft:cm2_perl_5.34.1-491:*:*:*:*:*:*:*:*">cm2 perl 5.34.1-491 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19555-16823"
      CPE="cpe:2.3:a:microsoft:cm2_postgresql_14.18-1:*:*:*:*:*:*:*:*">cm2 postgresql 14.18-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19558-16823"
      CPE="cpe:2.3:a:microsoft:cm2_erlang_25.3.2.21-1:*:*:*:*:*:*:*:*">cm2 erlang 25.3.2.21-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19559-16823"
      CPE="cpe:2.3:a:microsoft:cm2_net-tools_2.10-4:*:*:*:*:*:*:*:*">cm2 net-tools 2.10-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19565-16823"
      CPE="cpe:2.3:a:microsoft:cm2_jq_1.6-4:*:*:*:*:*:*:*:*">cm2 jq 1.6-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19568-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_libsoup_3.0.4-8:*:*:*:*:*:*:*:*">cbl2 libsoup 3.0.4-8 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19571-16823"
      CPE="cpe:2.3:a:microsoft:cbl2_icu_68.2.0.9-2:*:*:*:*:*:*:*:*">cbl2 icu 68.2.0.9-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19587-17084"
      CPE="cpe:2.3:a:microsoft:azl3_glibc_2.38-11:*:*:*:*:*:*:*:*">azl3 glibc 2.38-11 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19592-17084"
      CPE="cpe:2.3:a:microsoft:azl3_valkey_8.0.3-3:*:*:*:*:*:*:*:*">azl3 valkey 8.0.3-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19596-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libsoup_3.4.4-7:*:*:*:*:*:*:*:*">azl3 libsoup 3.4.4-7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19599-17084"
      CPE="cpe:2.3:a:microsoft:azl3_bind_9.20.9-1:*:*:*:*:*:*:*:*">azl3 bind 9.20.9-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19600-17084"
      CPE="cpe:2.3:a:microsoft:azl3_postgresql_16.9-1:*:*:*:*:*:*:*:*">azl3 postgresql 16.9-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19601-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python3_3.12.9-2:*:*:*:*:*:*:*:*">azl3 python3 3.12.9-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19603-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.75.0-16:*:*:*:*:*:*:*:*">azl3 rust 1.75.0-16 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19604-17084"
      CPE="cpe:2.3:a:microsoft:azl3_opa_0.63.0-2:*:*:*:*:*:*:*:*">azl3 opa 0.63.0-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19605-17084"
      CPE="cpe:2.3:a:microsoft:azl3_erlang_26.2.5.12-1:*:*:*:*:*:*:*:*">azl3 erlang 26.2.5.12-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19607-17084"
      CPE="cpe:2.3:a:microsoft:azl3_net-tools_2.10-4:*:*:*:*:*:*:*:*">azl3 net-tools 2.10-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19608-17084"
      CPE="cpe:2.3:a:microsoft:azl3_nodejs_20.14.0-8:*:*:*:*:*:*:*:*">azl3 nodejs 20.14.0-8 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19609-17084"
      CPE="cpe:2.3:a:microsoft:azl3_containerd2_2.0.0-12:*:*:*:*:*:*:*:*">azl3 containerd2 2.0.0-12 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19612-17084"
      CPE="cpe:2.3:a:microsoft:azl3_jq_1.7.1-4:*:*:*:*:*:*:*:*">azl3 jq 1.7.1-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19613-17084"
      CPE="cpe:2.3:a:microsoft:azl3_gh_2.62.0-9:*:*:*:*:*:*:*:*">azl3 gh 2.62.0-9 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19616-17084"
      CPE="cpe:2.3:a:microsoft:azl3_cmake_3.30.3-7:*:*:*:*:*:*:*:*">azl3 cmake 3.30.3-7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19617-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libsoup_3.4.4-8:*:*:*:*:*:*:*:*">azl3 libsoup 3.4.4-8 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19621-17084"
      CPE="cpe:2.3:a:microsoft:azl3_binutils_2.41-6:*:*:*:*:*:*:*:*">azl3 binutils 2.41-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19661-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_systemd_250.3-22:*:*:*:*:*:*:*:*">cbl2 systemd 250.3-22 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19666-17084"
      CPE="cpe:2.3:a:microsoft:azl3_ceph_18.2.2-8:*:*:*:*:*:*:*:*">azl3 ceph 18.2.2-8 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19668-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_tensorflow_2.11.1-2:*:*:*:*:*:*:*:*">cbl2 tensorflow 2.11.1-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19671-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.75.0-14:*:*:*:*:*:*:*:*">azl3 rust 1.75.0-14 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19681-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_python3_3.9.19-13:*:*:*:*:*:*:*:*">cbl2 python3 3.9.19-13 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19682-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.182.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.182.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19683-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.96.2-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.96.2-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19686-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.86.0-1:*:*:*:*:*:*:*:*">azl3 rust 1.86.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19693-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-tensorboard_2.16.2-6:*:*:*:*:*:*:*:*">azl3 python-tensorboard 2.16.2-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19711-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kata-containers_3.15.0.aks0-1:*:*:*:*:*:*:*:*">azl3 kata-containers 3.15.0.aks0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19721-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_rust_1.72.0-10:*:*:*:*:*:*:*:*">cbl2 rust 1.72.0-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19722-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kata-containers-cc_3.15.0.aks0-1:*:*:*:*:*:*:*:*">azl3 kata-containers-cc 3.15.0.aks0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19734-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.85.1-4:*:*:*:*:*:*:*:*">azl3 kernel 6.6.85.1-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19774-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_nghttp2_1.57.0-2:*:*:*:*:*:*:*:*">cbl2 nghttp2 1.57.0-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19787-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_fluent-bit_3.0.6-2:*:*:*:*:*:*:*:*">cbl2 fluent-bit 3.0.6-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19799-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_curl_8.8.0-6:*:*:*:*:*:*:*:*">cbl2 curl 8.8.0-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19844-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_postgresql_14.16-1:*:*:*:*:*:*:*:*">cbl2 postgresql 14.16-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19849-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_python-virtualenv_20.26.6-1:*:*:*:*:*:*:*:*">cbl2 python-virtualenv 20.26.6-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19852-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_mysql_8.0.41-1:*:*:*:*:*:*:*:*">cbl2 mysql 8.0.41-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19873-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs18_18.20.3-6:*:*:*:*:*:*:*:*">cbl2 nodejs18 18.20.3-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19876-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_glibc_2.35-7:*:*:*:*:*:*:*:*">cbl2 glibc 2.35-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19880-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.92.2-2:*:*:*:*:*:*:*:*">azl3 kernel 6.6.92.2-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19898-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_glib_2.71.0-5:*:*:*:*:*:*:*:*">cbl2 glib 2.71.0-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19904-17084"
      CPE="cpe:2.3:a:microsoft:azl3_nodejs_20.14.0-9:*:*:*:*:*:*:*:*">azl3 nodejs 20.14.0-9 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19949-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_pytorch_2.0.0-9:*:*:*:*:*:*:*:*">cbl2 pytorch 2.0.0-9 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="19980-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_hdf5_1.14.4-1:*:*:*:*:*:*:*:*">cbl2 hdf5 1.14.4-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20056-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs18_18.20.3-8:*:*:*:*:*:*:*:*">cbl2 nodejs18 18.20.3-8 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20095-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_libglvnd_1.3.2-5:*:*:*:*:*:*:*:*">cbl2 libglvnd 1.3.2-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20097-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_apparmor_3.0.4-4:*:*:*:*:*:*:*:*">cbl2 apparmor 3.0.4-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20122-17084"
      CPE="cpe:2.3:a:microsoft:azl3_systemd_255-22:*:*:*:*:*:*:*:*">azl3 systemd 255-22 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20162-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_icu_68.2.0.9-1:*:*:*:*:*:*:*:*">cbl2 icu 68.2.0.9-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20165-17084"
      CPE="cpe:2.3:a:microsoft:azl3_icu_72.1.0.3-2:*:*:*:*:*:*:*:*">azl3 icu 72.1.0.3-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20186-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_libsoup_3.0.4-7:*:*:*:*:*:*:*:*">cbl2 libsoup 3.0.4-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20190-17084"
      CPE="cpe:2.3:a:microsoft:azl3_libsoup_3.4.4-9:*:*:*:*:*:*:*:*">azl3 libsoup 3.4.4-9 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20202-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_yasm_1.3.0-17:*:*:*:*:*:*:*:*">cbl2 yasm 1.3.0-17 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20203-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_gdb_11.2-6:*:*:*:*:*:*:*:*">cbl2 gdb 11.2-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20219-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_binutils_2.37-15:*:*:*:*:*:*:*:*">cbl2 binutils 2.37-15 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20245-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_syslog-ng_3.33.2-8:*:*:*:*:*:*:*:*">cbl2 syslog-ng 3.33.2-8 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20248-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_erlang_25.3.2.20-1:*:*:*:*:*:*:*:*">cbl2 erlang 25.3.2.20-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20251-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_jq_1.6-4:*:*:*:*:*:*:*:*">cbl2 jq 1.6-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20254-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kata-containers-cc_3.15.0.aks0-4:*:*:*:*:*:*:*:*">azl3 kata-containers-cc 3.15.0.aks0-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20257-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.86.0-3:*:*:*:*:*:*:*:*">azl3 rust 1.86.0-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20258-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_azl-compliance_1.0.2-2:*:*:*:*:*:*:*:*">cbl2 azl-compliance 1.0.2-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20259-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kata-containers_3.15.0.aks0-2:*:*:*:*:*:*:*:*">azl3 kata-containers 3.15.0.aks0-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20269-17084"
      CPE="cpe:2.3:a:microsoft:azl3_bind_9.20.5-4:*:*:*:*:*:*:*:*">azl3 bind 9.20.5-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20271-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_net-tools_2.10-4:*:*:*:*:*:*:*:*">cbl2 net-tools 2.10-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20272-17084"
      CPE="cpe:2.3:a:microsoft:azl3_glib_2.78.6-3:*:*:*:*:*:*:*:*">azl3 glib 2.78.6-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20282-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_iputils_20211215-3:*:*:*:*:*:*:*:*">cbl2 iputils 20211215-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20284-17084"
      CPE="cpe:2.3:a:microsoft:azl3_iputils_20240117-2:*:*:*:*:*:*:*:*">azl3 iputils 20240117-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20292-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_jq_1.6-3:*:*:*:*:*:*:*:*">cbl2 jq 1.6-3 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20310-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_perl_5.34.1-491:*:*:*:*:*:*:*:*">cbl2 perl 5.34.1-491 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20313-17084"
      CPE="cpe:2.3:a:microsoft:azl3_perl_5.38.2-509:*:*:*:*:*:*:*:*">azl3 perl 5.38.2-509 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20365-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_glib_2.71.0-7:*:*:*:*:*:*:*:*">cbl2 glib 2.71.0-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20367-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs18_18.20.3-9:*:*:*:*:*:*:*:*">cbl2 nodejs18 18.20.3-9 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20379-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_libsoup_3.0.4-9:*:*:*:*:*:*:*:*">cbl2 libsoup 3.0.4-9 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20386-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_apparmor_3.0.4-5:*:*:*:*:*:*:*:*">cbl2 apparmor 3.0.4-5 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20412-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.96.2-2:*:*:*:*:*:*:*:*">azl3 kernel 6.6.96.2-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20421-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kata-containers-cc_3.15.0.aks0-5:*:*:*:*:*:*:*:*">azl3 kata-containers-cc 3.15.0.aks0-5 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20426-17084"
      CPE="cpe:2.3:a:microsoft:azl3_glibc_2.38-12:*:*:*:*:*:*:*:*">azl3 glibc 2.38-12 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20431-17084"
      CPE="cpe:2.3:a:microsoft:azl3_systemd_255-23:*:*:*:*:*:*:*:*">azl3 systemd 255-23 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20442-17084"
      CPE="cpe:2.3:a:microsoft:azl3_apparmor_3.1.7-1:*:*:*:*:*:*:*:*">azl3 apparmor 3.1.7-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20462-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_open-vm-tools_11.3.0-4:*:*:*:*:*:*:*:*">cbl2 open-vm-tools 11.3.0-4 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20463-17084"
      CPE="cpe:2.3:a:microsoft:azl3_open-vm-tools_12.3.5-2:*:*:*:*:*:*:*:*">azl3 open-vm-tools 12.3.5-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20466-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_glib_2.71.0-6:*:*:*:*:*:*:*:*">cbl2 glib 2.71.0-6 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20524-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_gdb_11.2-7:*:*:*:*:*:*:*:*">cbl2 gdb 11.2-7 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20531-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_systemd_250.3-23:*:*:*:*:*:*:*:*">cbl2 systemd 250.3-23 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20553-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.104.2-4:*:*:*:*:*:*:*:*">azl3 kernel 6.6.104.2-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20576-17084"
      CPE="cpe:2.3:a:microsoft:azl3_systemd_255-24:*:*:*:*:*:*:*:*">azl3 systemd 255-24 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20598-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_gdb_11.2-10:*:*:*:*:*:*:*:*">cbl2 gdb 11.2-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20613-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.112.1-2:*:*:*:*:*:*:*:*">azl3 kernel 6.6.112.1-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20668-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.116.1-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.116.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20686-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs18_18.20.3-10:*:*:*:*:*:*:*:*">cbl2 nodejs18 18.20.3-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20725-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.117.1-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.117.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20733-17084"
      CPE="cpe:2.3:a:microsoft:azl3_nodejs_20.14.0-10:*:*:*:*:*:*:*:*">azl3 nodejs 20.14.0-10 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20744-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.75.0-22:*:*:*:*:*:*:*:*">azl3 rust 1.75.0-22 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20755-17084"
      CPE="cpe:2.3:a:microsoft:azl3_hdf5_1.14.6-1:*:*:*:*:*:*:*:*">azl3 hdf5 1.14.6-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20762-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_hdf5_1.14.6-1:*:*:*:*:*:*:*:*">cbl2 hdf5 1.14.6-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20767-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.86.0-10:*:*:*:*:*:*:*:*">azl3 rust 1.86.0-10 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20788-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.119.3-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.119.3-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20822-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.90.0-1:*:*:*:*:*:*:*:*">azl3 rust 1.90.0-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20823-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.119.3-3:*:*:*:*:*:*:*:*">azl3 kernel 6.6.119.3-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20824-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kata-containers-cc_3.15.0.aks0-6:*:*:*:*:*:*:*:*">azl3 kata-containers-cc 3.15.0.aks0-6 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20860-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.121.1-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.121.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20864-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.75.0-24:*:*:*:*:*:*:*:*">azl3 rust 1.75.0-24 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20865-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.90.0-3:*:*:*:*:*:*:*:*">azl3 rust 1.90.0-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20866-17084"
      CPE="cpe:2.3:a:microsoft:azl3_nodejs_20.14.0-13:*:*:*:*:*:*:*:*">azl3 nodejs 20.14.0-13 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20868-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_glibc_2.35-9:*:*:*:*:*:*:*:*">cbl2 glibc 2.35-9 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20894-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs18_18.20.3-11:*:*:*:*:*:*:*:*">cbl2 nodejs18 18.20.3-11 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20918-17084"
      CPE="cpe:2.3:a:microsoft:azl3_python-virtualenv_20.36.1-1:*:*:*:*:*:*:*:*">azl3 python-virtualenv 20.36.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20925-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.200.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.200.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20935-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_glibc_2.35-10:*:*:*:*:*:*:*:*">cbl2 glibc 2.35-10 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20956-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.126.1-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.126.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20964-17084"
      CPE="cpe:2.3:a:microsoft:azl3_rust_1.90.0-4:*:*:*:*:*:*:*:*">azl3 rust 1.90.0-4 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="20971-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kata-containers-cc_3.15.0.aks0-7:*:*:*:*:*:*:*:*">azl3 kata-containers-cc 3.15.0.aks0-7 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21093-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_kernel_5.15.202.1-1:*:*:*:*:*:*:*:*">cbl2 kernel 5.15.202.1-1 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21094-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.130.1-3:*:*:*:*:*:*:*:*">azl3 kernel 6.6.130.1-3 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21111-17084"
      CPE="cpe:2.3:a:microsoft:azl3_nodejs_20.14.0-14:*:*:*:*:*:*:*:*">azl3 nodejs 20.14.0-14 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21121-17084"
      CPE="cpe:2.3:a:microsoft:azl3_hdf5_1.14.6-2:*:*:*:*:*:*:*:*">azl3 hdf5 1.14.6-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21122-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_hdf5_1.14.6-2:*:*:*:*:*:*:*:*">cbl2 hdf5 1.14.6-2 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21129-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kata-containers-cc_3.15.0.aks0-8:*:*:*:*:*:*:*:*">azl3 kata-containers-cc 3.15.0.aks0-8 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21130-17086"
      CPE="cpe:2.3:a:microsoft:cbl2_nodejs18_18.20.3-12:*:*:*:*:*:*:*:*">cbl2 nodejs18 18.20.3-12 on CBL Mariner 2.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21248-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.134.1-2:*:*:*:*:*:*:*:*">azl3 kernel 6.6.134.1-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21251-17084"
      CPE="cpe:2.3:a:microsoft:azl3_nodejs_20.14.0-15:*:*:*:*:*:*:*:*">azl3 nodejs 20.14.0-15 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21252-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kata-containers-cc_3.15.0.aks0-9:*:*:*:*:*:*:*:*">azl3 kata-containers-cc 3.15.0.aks0-9 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21308-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.137.1-2:*:*:*:*:*:*:*:*">azl3 kernel 6.6.137.1-2 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21332-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.138.1-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.138.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="21344-17084"
      CPE="cpe:2.3:a:microsoft:azl3_kernel_6.6.139.1-1:*:*:*:*:*:*:*:*">azl3 kernel 6.6.139.1-1 on Azure Linux 3.0</prod:FullProductName>
    <prod:FullProductName
      ProductID="9312"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23279:*:*:*:*:*:x64:*">Windows Server 2008 for 32-bit Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9318"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23279:*:*:*:*:*:x86:*">Windows Server 2008 for x64-based Systems Service Pack 2</prod:FullProductName>
    <prod:FullProductName
      ProductID="9344"
      CPE="cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.23279:*:*:*:*:*:x86:*">Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)</prod:FullProductName>
  </prod:ProductTree>
  <vuln:Vulnerability
    Ordinal="236">
    <vuln:Title>setuptools has a path traversal vulnerability in PackageIndex.download that leads to Arbitrary File Write</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-47273</vuln:CVE>
    <vuln:CWE
      ID="CWE-22">Improper Limitation of a Pathname to a Restricted Directory (&amp;#39;Path Traversal&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19849-17086</vuln:ProductID>
        <vuln:ProductID>17604-17084</vuln:ProductID>
        <vuln:ProductID>17171-17086</vuln:ProductID>
        <vuln:ProductID>19458-17084</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>20918-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19849-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17604-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17171-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19458-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20918-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19849-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17604-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17171-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19458-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20918-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19849-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17604-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17171-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19458-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20918-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19458-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>69.0.3-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19458-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-06-13T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added python-setuptools to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-21T03:02:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-30T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="20">
    <vuln:Title>tranport: TLS host name wildcard matching too lax</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2024-47619</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17458-17084</vuln:ProductID>
        <vuln:ProductID>20245-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17458-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20245-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17458-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20245-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>17458-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>20245-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17458-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>4.3.1-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17458-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20245-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.33.2-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20245-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-14T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-21T02:43:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-15T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="19">
    <vuln:Title>jq has signed integer overflow in jv.c:jvp_array_write</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2024-23337</vuln:CVE>
    <vuln:CWE
      ID="CWE-190">Integer Overflow or Wraparound</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19526-17084</vuln:ProductID>
        <vuln:ProductID>19535-16823</vuln:ProductID>
        <vuln:ProductID>20292-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19526-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19535-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20292-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19526-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19535-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20292-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19526-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19535-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20292-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19526-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.7.1-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19526-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19535-16823</vuln:ProductID>
        <vuln:ProductID>20292-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.6-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19535-16823</vuln:ProductID>
        <vuln:ProductID>20292-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:05:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title>backlight: led_bl: Hold led_access lock when calling led_sysfs_disable()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23144</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:01:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title>mptcp: fix NULL pointer in can_accept_new_subflow</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23145</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:57:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title>ext4: fix off-by-one error in do_split</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23150</vuln:CVE>
    <vuln:CWE
      ID="CWE-193">Off-by-one Error</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>8.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:19:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title>media: venus: hfi_parser: refactor hfi packet parsing logic</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23156</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:56:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="40">
    <vuln:Title>PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23161</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:23:27</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title>net: vlan: don't propagate flags on open</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23163</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:45:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>jfs: add sanity check for agwidth in dbMount</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37740</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:26:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>jfs: Prevent copying of nlink with value 0 from disk inode</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37741</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:20:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="56">
    <vuln:Title>net: libwx: handle page_pool_dev_alloc_pages error</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37755</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:29:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="57">
    <vuln:Title>net: tls: explicitly disallow disconnect</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37756</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:24:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="61">
    <vuln:Title>drm/nouveau: prime: fix ttm_bo_delayed_delete oops</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37765</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:33:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="63">
    <vuln:Title>drm/amd/pm: Prevent division by zero</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37767</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:10:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="68">
    <vuln:Title>RDMA/cma: Fix workqueue crash in cma_netevent_work_handler</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37772</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:20:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="69">
    <vuln:Title>virtiofs: add filesystem context source name check</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37773</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:52:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="73">
    <vuln:Title>ksmbd: Fix dangling pointer in krb_authenticate</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37778</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:14:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="75">
    <vuln:Title>i2c: cros-ec-tunnel: defer probe if parent EC is not present</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37781</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:19:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="78">
    <vuln:Title>net: dsa: mv88e6xxx: avoid unregistering devlink regions which were never registered</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37787</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:42:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="80">
    <vuln:Title>net: openvswitch: fix nested key length validation in the set() action</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37789</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:13:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="84">
    <vuln:Title>wifi: mac80211: Purge vif txq in ieee80211_do_stop()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37794</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:22:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="85">
    <vuln:Title>Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37795</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37795</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37795</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37795</vuln:URL>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37795</vuln:URL>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="90">
    <vuln:Title>spi: spi-imx: Add check for spi_imx_setupxfer()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37801</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:32:13</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:37:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:19:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="97">
    <vuln:Title>crypto: null - Use spin lock instead of mutex</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37808</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:09:43</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="98">
    <vuln:Title>usb: dwc3: gadget: check that event count does not exceed event buffer length</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37810</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:56:12</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="102">
    <vuln:Title>irqchip/gic-v2m: Prevent use after free of gicv2m_get_fwnode()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37819</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:17:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="105">
    <vuln:Title>net_sched: hfsc: Fix a potential UAF in hfsc_dequeue() too</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37823</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:33:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="110">
    <vuln:Title>cpufreq: scmi: Fix null-ptr-deref in scmi_cpufreq_get_rate()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37830</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:21:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="111">
    <vuln:Title>cpufreq: apple-soc: Fix null-ptr-deref in apple_soc_cpufreq_get_rate()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37831</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:21:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="115">
    <vuln:Title>jbd2: remove wrong sb-&gt;s_sequence check</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37839</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:21:08</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="117">
    <vuln:Title>pm: cpupower: bench: Prevent NULL dereference on malloc failure</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37841</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:39:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="121">
    <vuln:Title>fbdev: omapfb: Add 'plane' value check</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37851</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:42:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="123">
    <vuln:Title>drm/amdkfd: debugfs hang_hws skip GPU with MES</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37853</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-19T01:01:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:07:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:49:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:39:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="132">
    <vuln:Title>net: dsa: clean up FDB, MDB, VLAN entries on unbind</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37864</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:13:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="131">
    <vuln:Title>HID: pidff: Fix null pointer dereference in pidff_find_fields</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37862</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:48:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="137">
    <vuln:Title>igc: fix PTM cycle trigger logic</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37875</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:51:38</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="145">
    <vuln:Title>bpf: Fix deadlock between rcu_tasks_trace and event_mutex.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37884</vuln:CVE>
    <vuln:CWE
      ID="CWE-667">Improper Locking</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:12:22</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T15:01:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:41:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="146">
    <vuln:Title>KVM: x86: Reset IRTE to host control if *new* route isn't postable</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37885</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:59:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="151">
    <vuln:Title>mtd: inftlcore: Add error check for inftl_read_oob()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37892</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:30:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="158">
    <vuln:Title>net: lan743x: Fix memleak issue when GSO enabled</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37909</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:30:45</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="156">
    <vuln:Title>firmware: arm_scmi: Balance device refcount when destroying devices</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37905</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.3</vuln:BaseScore>
        <vuln:TemporalScore>2.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:07:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="162">
    <vuln:Title>net_sched: drr: Fix double list add in class with netem as child qdisc</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37915</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:58:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="168">
    <vuln:Title>tracing: Fix oob write in trace_seq_to_buffer()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37923</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:31:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="169">
    <vuln:Title>ksmbd: fix use-after-free in kerberos authentication</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37924</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:20:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="177">
    <vuln:Title>perf/x86/intel: KVM: Mask PEBS_ENABLE loaded for guest with vCPU's value.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37936</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:01:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="181">
    <vuln:Title>wifi: ath12k: Fix invalid data access in ath12k_dp_rx_h_undecap_nwifi</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37943</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37943</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37943</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>8.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37943</vuln:URL>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37943</vuln:URL>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:03:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="184">
    <vuln:Title>ksmbd: prevent out-of-bounds stream writes by validating *pos</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37947</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:19:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="188">
    <vuln:Title>smb: client: Avoid race in open_cached_dir with lease breaks</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37954</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37954</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37954</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37954</vuln:URL>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37954</vuln:URL>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-18T01:37:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:05:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:36:41</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="189">
    <vuln:Title>ksmbd: prevent rename with empty string</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37956</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:36:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:53:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-18T01:38:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="193">
    <vuln:Title>memblock: Accept allocated memory before use in memblock_double_array()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37960</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:47:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="195">
    <vuln:Title>arm64: bpf: Only mitigate cBPF programs loaded by unprivileged users</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37963</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37963</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37963</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37963</vuln:URL>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37963</vuln:URL>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:16:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="194">
    <vuln:Title>ipvs: fix uninit-value for saddr in do_output_route4</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37961</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-18T01:01:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:42:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:42:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:51:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="201">
    <vuln:Title>wifi: cfg80211: fix out-of-bounds access during multi-link element defragmentation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37973</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:00:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="209">
    <vuln:Title>USB: wdm: close race between wdm_open and wdm_wwan_port_stop</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37985</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:54:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="207">
    <vuln:Title>qibfs: fix _another_ leak</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37983</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:51:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="214">
    <vuln:Title>net_sched: Flush gso_skb list too during -&gt;change()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37992</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:56:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="217">
    <vuln:Title>netfilter: ipset: fix region locking in hash types</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37997</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:48:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="219">
    <vuln:Title>DNS message with invalid TSIG causes an assertion failure</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="isc"
        Type="CNA"
        Ordinal="30">isc</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-40775</vuln:CVE>
    <vuln:CWE
      ID="CWE-232">Improper Handling of Undefined Values</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19599-17084</vuln:ProductID>
        <vuln:ProductID>20269-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19599-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20269-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19599-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20269-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19599-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20269-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19599-17084</vuln:ProductID>
        <vuln:ProductID>20269-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.20.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19599-17084</vuln:ProductID>
        <vuln:ProductID>20269-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:07:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="221">
    <vuln:Title>PostgreSQL GB18030 encoding validation can read one byte past end of allocation for text that fails validation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="PostgreSQL"
        Type="CNA"
        Ordinal="30">PostgreSQL</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4207</vuln:CVE>
    <vuln:CWE
      ID="CWE-126">Buffer Over-read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19555-16823</vuln:ProductID>
        <vuln:ProductID>19600-17084</vuln:ProductID>
        <vuln:ProductID>19262-17084</vuln:ProductID>
        <vuln:ProductID>19844-17086</vuln:ProductID>
        <vuln:ProductID>20744-17084</vuln:ProductID>
        <vuln:ProductID>20822-17084</vuln:ProductID>
        <vuln:ProductID>19261-17086</vuln:ProductID>
        <vuln:ProductID>20865-17084</vuln:ProductID>
        <vuln:ProductID>20964-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19555-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19600-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19262-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19844-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19261-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20964-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19555-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19600-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19262-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19844-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19261-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20964-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19555-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19600-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19262-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19844-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20822-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19261-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20964-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19555-16823</vuln:ProductID>
        <vuln:ProductID>19844-17086</vuln:ProductID>
        <vuln:ProductID>19261-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>14.18-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19555-16823</vuln:ProductID>
        <vuln:ProductID>19844-17086</vuln:ProductID>
        <vuln:ProductID>19261-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19600-17084</vuln:ProductID>
        <vuln:ProductID>19262-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.9-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19600-17084</vuln:ProductID>
        <vuln:ProductID>19262-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20865-17084</vuln:ProductID>
        <vuln:ProductID>20964-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.90.0-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20865-17084</vuln:ProductID>
        <vuln:ProductID>20964-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-02-21T02:45:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-01-21T01:05:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:36:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="224">
    <vuln:Title>Ring: some aes functions may panic when overflow checking is enabled in ring</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4432</vuln:CVE>
    <vuln:CWE
      ID="CWE-770">Allocation of Resources Without Limits or Throttling</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19693-17084</vuln:ProductID>
        <vuln:ProductID>20744-17084</vuln:ProductID>
        <vuln:ProductID>20767-17084</vuln:ProductID>
        <vuln:ProductID>19711-17084</vuln:ProductID>
        <vuln:ProductID>19722-17084</vuln:ProductID>
        <vuln:ProductID>20864-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20767-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19711-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19722-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20767-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19711-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19722-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20864-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19693-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20767-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19711-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19722-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20864-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19711-17084</vuln:ProductID>
        <vuln:ProductID>19722-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19711-17084</vuln:ProductID>
        <vuln:ProductID>19722-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-01-07T01:01:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-13T01:37:13</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-08-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-02-21T02:50:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="233">
    <vuln:Title>Erlang/OTP SSH Has Strict KEX Violations</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-46712</vuln:CVE>
    <vuln:CWE
      ID="CWE-440">Expected Behavior Violation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19558-16823</vuln:ProductID>
        <vuln:ProductID>19605-17084</vuln:ProductID>
        <vuln:ProductID>20248-17086</vuln:ProductID>
        <vuln:ProductID>19449-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19558-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19605-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20248-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19449-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19558-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19605-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>20248-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19449-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19558-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19605-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>20248-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.7</vuln:BaseScore>
        <vuln:TemporalScore>3.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19449-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19558-16823</vuln:ProductID>
        <vuln:ProductID>20248-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>25.3.2.21-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19558-16823</vuln:ProductID>
        <vuln:ProductID>20248-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19605-17084</vuln:ProductID>
        <vuln:ProductID>19449-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>26.2.5.12-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19605-17084</vuln:ProductID>
        <vuln:ProductID>19449-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T02:46:10</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="234">
    <vuln:Title>net-tools Stack-based Buffer Overflow vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-46836</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19559-16823</vuln:ProductID>
        <vuln:ProductID>19607-17084</vuln:ProductID>
        <vuln:ProductID>20271-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19559-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19607-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20271-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19559-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19607-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20271-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.6</vuln:BaseScore>
        <vuln:TemporalScore>6.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</vuln:Vector>
        <vuln:ProductID>19559-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.6</vuln:BaseScore>
        <vuln:TemporalScore>6.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</vuln:Vector>
        <vuln:ProductID>19607-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.6</vuln:BaseScore>
        <vuln:TemporalScore>6.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H</vuln:Vector>
        <vuln:ProductID>20271-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19559-16823</vuln:ProductID>
        <vuln:ProductID>19607-17084</vuln:ProductID>
        <vuln:ProductID>20271-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.10-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19559-16823</vuln:ProductID>
        <vuln:ProductID>19607-17084</vuln:ProductID>
        <vuln:ProductID>20271-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T02:53:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="243">
    <vuln:Title>Libsoup: integer underflow in soup_multipart_new_from_message() leading to denial of service in libsoup</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4948</vuln:CVE>
    <vuln:CWE
      ID="CWE-191">Integer Underflow (Wrap or Wraparound)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19568-16823</vuln:ProductID>
        <vuln:ProductID>19617-17084</vuln:ProductID>
        <vuln:ProductID>20186-17086</vuln:ProductID>
        <vuln:ProductID>19596-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19568-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19617-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19596-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19568-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19617-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19596-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19568-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19617-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19596-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19568-16823</vuln:ProductID>
        <vuln:ProductID>20186-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.0.4-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19568-16823</vuln:ProductID>
        <vuln:ProductID>20186-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19617-17084</vuln:ProductID>
        <vuln:ProductID>19596-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.4.4-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19617-17084</vuln:ProductID>
        <vuln:ProductID>19596-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-08-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-08-12T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added libsoup to CBL-Mariner 2.0
Added libsoup to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:00:46</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="247">
    <vuln:Title>GNU Binutils ld elflink.c elf_gc_sweep memory corruption</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="VulDB"
        Type="CNA"
        Ordinal="30">VulDB</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5244</vuln:CVE>
    <vuln:CWE
      ID="CWE-119">Improper Restriction of Operations within the Bounds of a Memory Buffer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19621-17084</vuln:ProductID>
        <vuln:ProductID>20203-17086</vuln:ProductID>
        <vuln:ProductID>20524-17086</vuln:ProductID>
        <vuln:ProductID>20219-17086</vuln:ProductID>
        <vuln:ProductID>20598-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19621-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20203-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20524-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20219-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20598-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19621-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20203-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20524-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20219-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20598-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19621-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20203-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20524-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20219-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20598-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19621-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.41-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19621-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20524-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>11.2-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20524-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20219-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.37-15</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20219-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20598-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>11.2-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20598-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:08:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="157">
    <vuln:Title>accel/ivpu: Fix locking order in ivpu_job_submit</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37907</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:40:09</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:50:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:44:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:55:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T21:53:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:37:09</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:51:08</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:17:45</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:49:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:47:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:48:41</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="231">
    <vuln:Title>Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4598</vuln:CVE>
    <vuln:CWE
      ID="CWE-364">Signal Handler Race Condition</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20122-17084</vuln:ProductID>
        <vuln:ProductID>19661-17086</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20431-17084</vuln:ProductID>
        <vuln:ProductID>20531-17086</vuln:ProductID>
        <vuln:ProductID>20576-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20122-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19661-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20431-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20531-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20576-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>20122-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19661-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20431-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20531-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20576-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>20122-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19661-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>20431-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>20531-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N</vuln:Vector>
        <vuln:ProductID>20576-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19661-17086</vuln:ProductID>
        <vuln:ProductID>20531-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>250.3-23</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19661-17086</vuln:ProductID>
        <vuln:ProductID>20531-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20431-17084</vuln:ProductID>
        <vuln:ProductID>20576-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>255-24</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20431-17084</vuln:ProductID>
        <vuln:ProductID>20576-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:03:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:04:10</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="180">
    <vuln:Title>HID: pidff: Make sure to fetch pool before checking SIMULTANEOUS_MAX</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37942</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T21:59:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-19T01:02:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:46:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>wifi: ath12k: Avoid memory leak while enabling statistics</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37743</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:34:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="113">
    <vuln:Title>mm/vmscan: don't try to reclaim hwpoison folio</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37834</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:45:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:48:15</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:47:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:41:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:01:45</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:43:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-18T01:37:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:36:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:43:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:45:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-04-30T01:43:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>12.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:42:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>13.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:43:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="60">
    <vuln:Title>ublk: fix handling recovery &amp; reissue in ublk_abort_queue()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37759</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:48:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="125">
    <vuln:Title>drm/amd/display: Guard Possible Null Pointer Dereference</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37855</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:53:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="135">
    <vuln:Title>drm/amd/display: prevent hang on link training fail</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37870</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:55:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:48:23</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:43:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:41:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:02:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:49:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:47:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:45:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:43:46</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:42:38</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:43:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="165">
    <vuln:Title>xsk: Fix race condition in AF_XDP generic RX path</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37920</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:01:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:49:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:43:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:46:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-02-27T14:35:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:11:55</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:47:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:57:08</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title>net: stmmac: Fix accessing freed irq affinity_hint</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23155</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:04:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-02T14:35:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:52:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:06:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="7">
    <vuln:Title>blk-mq: Fix kmemleak in blk_mq_init_allocated_queue</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-49901</vuln:CVE>
    <vuln:CWE
      ID="CWE-401">Missing Release of Memory after Effective Lifetime</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:11:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:52:54</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:36:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="222">
    <vuln:Title>PyTorch nccl.py torch.cuda.nccl.reduce denial of service</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="VulDB"
        Type="CNA"
        Ordinal="30">VulDB</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4287</vuln:CVE>
    <vuln:CWE
      ID="CWE-404">Improper Resource Shutdown or Release</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19407-17084</vuln:ProductID>
        <vuln:ProductID>19949-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19407-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19949-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19407-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19949-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19407-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19949-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:22:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T02:42:13</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="138">
    <vuln:Title>iommu: Clear iommu-dma ops on cleanup</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37877</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:22:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:50:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:44:38</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-03T15:00:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:06:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:43:41</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:48:27</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:46:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:42:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:50:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:44:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>12.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:44:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="107">
    <vuln:Title>scsi: ufs: core: Add NULL check in ufshcd_mcq_compl_pending_transfer()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37826</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:25:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:50:12</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:48:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:44:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:46:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:42:22</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:50:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:06:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:44:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:43:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:44:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="141">
    <vuln:Title>um: work around sched_yield not yielding in time-travel mode</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37880</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:50:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:36:23</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="174">
    <vuln:Title>btrfs: adjust subpage bit start based on sectorsize</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37931</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.112.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T23:57:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-21T01:01:23</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:46:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-12-23T01:36:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:57:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="170">
    <vuln:Title>ksmbd: fix use-after-free in ksmbd_session_rpc_open</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37926</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T00:12:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:36:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>PM: hibernate: Avoid deadlock in hibernate_compressor_param_set()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37745</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T00:34:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:36:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:46:53</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:52:55</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-05T01:41:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:12:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:52:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:50:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:48:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:47:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:45:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>12.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:46:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="244">
    <vuln:Title>Libsoup: off-by-one out-of-bounds read in find_boundary() in soup-multipart.c</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4969</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20186-17086</vuln:ProductID>
        <vuln:ProductID>20190-17084</vuln:ProductID>
        <vuln:ProductID>20379-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20190-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20379-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20190-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20379-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20190-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20379-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20186-17086</vuln:ProductID>
        <vuln:ProductID>20379-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.0.4-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20186-17086</vuln:ProductID>
        <vuln:ProductID>20379-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20190-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.4.4-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20190-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T00:56:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:03:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="95">
    <vuln:Title>fs/ntfs3: Keep write operations atomic</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37806</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:40:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T00:57:46</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="153">
    <vuln:Title>ksmbd: fix use-after-free in session logoff</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37899</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:01:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-21T01:01:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:38:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="72">
    <vuln:Title>ksmbd: fix use-after-free in __smb2_lease_break_noti()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37777</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.104.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:09:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:36:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="126">
    <vuln:Title>btrfs: harden block_group::bg_list against list_del() races</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37856</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:23:30</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:38:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:35:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:48:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-03T15:00:12</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:43:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:15:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:54:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:46:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:49:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:48:16</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>12.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:47:41</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="17">
    <vuln:Title>parse_string in cJSON before 1.7.18 has a heap-based buffer over-read via {"1":1, with no trailing newline if cJSON_ParseWithLength is called.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-53154</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20097-17086</vuln:ProductID>
        <vuln:ProductID>19666-17084</vuln:ProductID>
        <vuln:ProductID>20386-17086</vuln:ProductID>
        <vuln:ProductID>20095-17086</vuln:ProductID>
        <vuln:ProductID>16928-17084</vuln:ProductID>
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20097-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20386-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20095-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>16928-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>20097-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>20386-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>20095-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>16928-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.9</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20097-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.9</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19666-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.9</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20386-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.9</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20095-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.9</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>16928-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.9</vuln:BaseScore>
        <vuln:TemporalScore>2.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20442-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20097-17086</vuln:ProductID>
        <vuln:ProductID>20386-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.0.4-5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20097-17086</vuln:ProductID>
        <vuln:ProductID>20386-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20442-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.1.7-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20442-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:32:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:12:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="197">
    <vuln:Title>iio: light: opt3001: fix deadlock due to concurrent flag access</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37968</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-18T01:01:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-13T01:38:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:38:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:26:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="143">
    <vuln:Title>usb: xhci: Fix isochronous Ring Underrun/Overrun event handling</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37882</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:40:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:38:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:50:08</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-03T15:01:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:44:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:54:15</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:46:46</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:35:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:48:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:16:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:48:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>12.0</cvrf:Number>
        <cvrf:Date>2026-05-11T14:44:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>13.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:47:48</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="104">
    <vuln:Title>riscv: uprobes: Add missing fence.i after building the XOL buffer</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37822</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:43:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:38:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:35:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:49:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:50:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:54:54</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:09:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="112">
    <vuln:Title>net/niu: Niu requires MSIX ENTRY_DATA fields touch before entry reads</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37833</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T02:27:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:36:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:48:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="227">
    <vuln:Title>hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5Z__filter_scaleoffset function.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-44905</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17741-17084</vuln:ProductID>
        <vuln:ProductID>19980-17086</vuln:ProductID>
        <vuln:ProductID>17336-17086</vuln:ProductID>
        <vuln:ProductID>20762-17086</vuln:ProductID>
        <vuln:ProductID>20755-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17741-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19980-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17336-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20762-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20755-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17741-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19980-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17336-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20762-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20755-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U</vuln:Vector>
        <vuln:ProductID>17741-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19980-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U</vuln:Vector>
        <vuln:ProductID>17336-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20762-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20755-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17741-17084</vuln:ProductID>
        <vuln:ProductID>17336-17086</vuln:ProductID>
        <vuln:ProductID>20762-17086</vuln:ProductID>
        <vuln:ProductID>20755-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.14.6-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17741-17084</vuln:ProductID>
        <vuln:ProductID>17336-17086</vuln:ProductID>
        <vuln:ProductID>20762-17086</vuln:ProductID>
        <vuln:ProductID>20755-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T04:59:10</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-16T01:36:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-12-20T01:36:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-02T14:36:41</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:44:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="118">
    <vuln:Title>spi: fsl-qspi: use devm function instead of driver remove</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37842</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-19T01:01:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:48:08</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T05:46:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-19T01:42:53</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:38:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="0">
    <vuln:Title>bpf: Prevent bpf program recursion for raw tracepoint probes</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-49764</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-08T01:08:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:53:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:07:27</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title>netdevsim: Fix memory leak of nsim_dev-&gt;fa_cookie</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-49803</vuln:CVE>
    <vuln:CWE
      ID="CWE-401">Missing Release of Memory after Effective Lifetime</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:54:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:08:53</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-09T01:01:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title>netfs: Fix missing xas_retry() calls in xarray iteration</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-49810</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:40:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-09T01:01:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title>scsi: mpi3mr: Bad drive in topology results kernel crash</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-53037</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-14T01:03:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:58:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:38:16</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="12">
    <vuln:Title>net: usb: lan78xx: Limit packet length to skb-&gt;len</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-53068</vuln:CVE>
    <vuln:CWE
      ID="CWE-401">Missing Release of Memory after Effective Lifetime</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:59:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:39:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-14T01:03:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="183">
    <vuln:Title>net: phy: allow MDIO bus PM ops to start/stop state machine for phylink-controlled PHY</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37945</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>20668-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20668-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20668-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20668-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-18T01:01:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-18T14:35:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-11-19T01:02:13</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:39:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:50:22</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-02-27T14:36:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:39:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:50:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:36:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-02-18T14:24:55</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="230">
    <vuln:Title>The x509 application adds trusted use instead of rejected use</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="openssl"
        Type="CNA"
        Ordinal="30">openssl</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4575</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20744-17084</vuln:ProductID>
        <vuln:ProductID>20822-17084</vuln:ProductID>
        <vuln:ProductID>20864-17084</vuln:ProductID>
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20822-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20864-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20744-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20822-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20864-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20865-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T15:04:44</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2026-01-21T01:06:08</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="42">
    <vuln:Title />
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="hackerone"
        Type="CNA"
        Ordinal="30">hackerone</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23167</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19904-17084</vuln:ProductID>
        <vuln:ProductID>19445-17084</vuln:ProductID>
        <vuln:ProductID>19787-17086</vuln:ProductID>
        <vuln:ProductID>19774-17086</vuln:ProductID>
        <vuln:ProductID>20056-17086</vuln:ProductID>
        <vuln:ProductID>20733-17084</vuln:ProductID>
        <vuln:ProductID>21111-17084</vuln:ProductID>
        <vuln:ProductID>21130-17086</vuln:ProductID>
        <vuln:ProductID>21251-17084</vuln:ProductID>
        <vuln:ProductID>20367-17086</vuln:ProductID>
        <vuln:ProductID>20686-17086</vuln:ProductID>
        <vuln:ProductID>20866-17084</vuln:ProductID>
        <vuln:ProductID>20894-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19445-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19787-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19774-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20056-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20733-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21111-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21130-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21251-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20367-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20686-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20866-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20894-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19445-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19787-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19774-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>20056-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20733-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21111-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21130-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21251-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20367-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20686-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20866-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20894-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>19445-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>19787-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>19774-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>20056-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>20733-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>21111-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>21130-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>21251-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>20367-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>20686-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>20866-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>20894-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19445-17084</vuln:ProductID>
        <vuln:ProductID>19787-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19445-17084</vuln:ProductID>
        <vuln:ProductID>19787-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-06T14:36:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:45:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-02-21T02:58:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:46:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T00:32:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:54:23</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="18">
    <vuln:Title>yasm commit 9defefae was discovered to contain a NULL pointer dereference via the yasm_section_bcs_append function at section.c.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2024-22653</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19525-17084</vuln:ProductID>
        <vuln:ProductID>20202-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19525-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20202-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19525-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20202-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19525-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>20202-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19525-17084</vuln:ProductID>
        <vuln:ProductID>20202-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.3.0-17</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19525-17084</vuln:ProductID>
        <vuln:ProductID>20202-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:35:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-08-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="235">
    <vuln:Title>ping in iputils before 20250602 allows a denial of service</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-47268</vuln:CVE>
    <vuln:CWE
      ID="CWE-190" />
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20284-17084</vuln:ProductID>
        <vuln:ProductID>20282-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20284-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20282-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20284-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20282-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20284-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20282-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20284-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20240117-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20284-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20282-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20211215-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20282-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-08-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:15:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="21">
    <vuln:Title>bpf: track changes_pkt_data property for global functions</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2024-58098</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:44:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:10:48</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:56:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title>bpf: check changes_pkt_data property for extension programs</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2024-58100</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:56:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:27:54</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:11:12</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title>bpf: consider that tail calls invalidate packet pointers</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2024-58237</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:56:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:11:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:52:43</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="25">
    <vuln:Title>misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23140</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:53:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="26">
    <vuln:Title>KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23141</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:47:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:52:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:06:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title>sctp: detect and prevent references to a freed transport in sendmsg</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23142</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:23:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title>mfd: ene-kb3930: Fix a potential NULL pointer dereference</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23146</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:50:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="32">
    <vuln:Title>i3c: Add NULL pointer check in i3c_master_queue_ibi()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23147</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:07:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="33">
    <vuln:Title>soc: samsung: exynos-chipid: Add NULL pointer check in exynos_chipid_probe()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23148</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:57:10</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title>media: venus: hfi_parser: add check to avoid out of bound access</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23157</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:46:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title>media: venus: hfi: add check to handle incorrect queue size</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23158</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:37:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="39">
    <vuln:Title>media: venus: hfi: add a check to handle OOB in sfr region</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23159</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:29:16</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="43">
    <vuln:Title>redis-check-aof may lead to stack overflow and potential RCE</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-27151</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19592-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19592-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19592-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19592-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19592-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.0.3-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19592-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="44">
    <vuln:Title>ext4: ignore xattrs past end</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37738</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:55:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title>f2fs: fix to avoid out-of-bounds access in f2fs_truncate_inode_blocks()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37739</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:44:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>jfs: Fix uninit-value access of imap allocated in the diMount() function</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37742</vuln:CVE>
    <vuln:CWE
      ID="CWE-908">Use of Uninitialized Resource</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:58:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="53">
    <vuln:Title>net: ppp: Add bound checking for skb data on ppp_sync_txmung</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37749</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:14:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="55">
    <vuln:Title>drm/i915/huc: Fix fence not released on early probe errors</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37754</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:31:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="58">
    <vuln:Title>tipc: fix memory leak in tipc_link_xmit</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37757</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:03:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="59">
    <vuln:Title>ata: pata_pxa: Fix potential NULL pointer dereference in pxa_ata_probe()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37758</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:00:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="62">
    <vuln:Title>drm/amd/pm: Prevent division by zero</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37766</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:22:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="64">
    <vuln:Title>drm/amd/pm: Prevent division by zero</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37768</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:32:09</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="65">
    <vuln:Title>drm/amd/pm/smu11: Prevent division by zero</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37769</vuln:CVE>
    <vuln:CWE
      ID="CWE-369">Divide By Zero</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:32:46</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="66">
    <vuln:Title>drm/amd/pm: Prevent division by zero</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37770</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:35:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="67">
    <vuln:Title>drm/amd/pm: Prevent division by zero</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37771</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:36:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="70">
    <vuln:Title>ksmbd: fix the warning from __kernel_write_iter</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37775</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:17:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="71">
    <vuln:Title>ksmbd: fix use-after-free in smb_break_all_levII_oplock()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37776</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:36:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:11:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="74">
    <vuln:Title>isofs: Prevent the use of too small fid</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37780</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:59:10</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="77">
    <vuln:Title>net: dsa: free routing table on probe failure</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37786</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:49:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:24:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:02:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="79">
    <vuln:Title>cxgb4: fix memory leak in cxgb4_init_ethtool_filters() error path</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37788</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.3</vuln:BaseScore>
        <vuln:TemporalScore>3.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:30:54</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="81">
    <vuln:Title>net: mctp: Set SOCK_RCU_FREE</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37790</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:24:55</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="82">
    <vuln:Title>Bluetooth: btrtl: Prevent potential NULL dereference</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37792</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:20:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="83">
    <vuln:Title>ASoC: Intel: avs: Fix null-ptr-deref in avs_component_probe()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37793</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.4</vuln:BaseScore>
        <vuln:TemporalScore>4.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:29:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="86">
    <vuln:Title>wifi: at76c50x: fix use after free access in at76_disconnect</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37796</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:11:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="87">
    <vuln:Title>net_sched: hfsc: Fix a UAF vulnerability in class handling</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37797</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:06:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="88">
    <vuln:Title>codel: remove sch-&gt;q.qlen check before qdisc_tree_reduce_backlog()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37798</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.200.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:14:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-24T14:35:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="89">
    <vuln:Title>driver core: fix potential NULL pointer dereference in dev_uevent()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37800</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:18:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:49:13</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:37:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="92">
    <vuln:Title>udmabuf: fix a buf size overflow issue during udmabuf creation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37803</vuln:CVE>
    <vuln:CWE
      ID="CWE-120">Buffer Copy without Checking Size of Input (&amp;#39;Classic Buffer Overflow&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:56:38</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="94">
    <vuln:Title>sound/virtio: Fix cancel_sync warnings on uninitialized work_structs</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37805</vuln:CVE>
    <vuln:CWE
      ID="CWE-770">Allocation of Resources Without Limits or Throttling</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:43:41</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="99">
    <vuln:Title>usb: cdns3: Fix deadlock when using NCM gadget</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37812</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:55:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="100">
    <vuln:Title>mcb: fix a double free bug in chameleon_parse_gdd()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37817</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:26:38</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="101">
    <vuln:Title>LoongArch: Return NULL from huge_pte_offset() for invalid PMD</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37818</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:27:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="106">
    <vuln:Title>tipc: fix NULL pointer dereference in tipc_mon_reinit_self()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37824</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:58:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="108">
    <vuln:Title>scsi: ufs: mcq: Add NULL check in ufshcd_mcq_abort()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37828</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:08:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="109">
    <vuln:Title>cpufreq: scpi: Fix null-ptr-deref in scpi_cpufreq_get_rate()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37829</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:09:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="114">
    <vuln:Title>PCI: Fix reference leak in pci_register_host_bridge()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37836</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:15:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="116">
    <vuln:Title>mtd: rawnand: brcmnand: fix PM resume warning</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37840</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:55:43</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="119">
    <vuln:Title>cifs: avoid NULL pointer dereference in dbg call</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37844</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:08:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="120">
    <vuln:Title>KVM: arm64: Tear down vGIC on failed vCPU creation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37849</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-19T01:01:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:46:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:38:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:48:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="122">
    <vuln:Title>drm/amdgpu: handle amdgpu_cgs_create_device() errors in amd_powerplay_create()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37852</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-19T01:01:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:07:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:48:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:39:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="124">
    <vuln:Title>drm/amdkfd: Fix mode1 reset crash issue</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37854</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:35:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="127">
    <vuln:Title>scsi: st: Fix array overflow in st_setup()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37857</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:43:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="128">
    <vuln:Title>fs/jfs: Prevent integer overflow in AG size calculation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37858</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37858</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37858</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37858</vuln:URL>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37858</vuln:URL>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:41:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="129">
    <vuln:Title>page_pool: avoid infinite loop to schedule delayed worker</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37859</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:16:48</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="133">
    <vuln:Title>net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is unsupported</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37865</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:15:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="134">
    <vuln:Title>RDMA/core: Silence oversized kvmalloc() warning</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37867</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:38:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="136">
    <vuln:Title>net: ngbe: fix memory leak in ngbe_probe() error path</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37874</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:00:13</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="139">
    <vuln:Title>perf/core: Fix WARN_ON(!ctx) in __free_event() for partial init</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37878</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T15:01:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:40:41</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:57:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="140">
    <vuln:Title>9p/net: fix improper handling of bogus negative read/write replies</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37879</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:33:04</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:41:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T15:01:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="142">
    <vuln:Title>usb: gadget: aspeed: Add NULL pointer check in ast_vhub_init_dev()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37881</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:41:23</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="144">
    <vuln:Title>s390/sclp: Add check for get_zeroed_page()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37883</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:13:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="147">
    <vuln:Title>pds_core: make wait_context part of q_info</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37886</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:51:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="148">
    <vuln:Title>pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37887</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:11:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="149">
    <vuln:Title>net_sched: hfsc: Fix a UAF vulnerability in class with netem as child qdisc</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37890</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:32:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="150">
    <vuln:Title>ALSA: ump: Fix buffer overflow at UMP SysEx message conversion</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37891</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:55:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="152">
    <vuln:Title>wifi: plfxlc: Remove erroneous assert in plfxlc_mac_release</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37897</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:31:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="154">
    <vuln:Title>irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37901</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:29:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="155">
    <vuln:Title>drm/amd/display: Fix slab-use-after-free in hdcp</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37903</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.8</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-19T01:02:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:39:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:49:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:30:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="159">
    <vuln:Title>bnxt_en: Fix out-of-bound memcpy() during ethtool -w</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37911</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:02:27</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="160">
    <vuln:Title>net_sched: qfq: Fix double list add in class with netem as child qdisc</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37913</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.3</vuln:BaseScore>
        <vuln:TemporalScore>6.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:44:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="161">
    <vuln:Title>net_sched: ets: Fix double list add in class with netem as child qdisc</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37914</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:01:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="163">
    <vuln:Title>pds_core: remove write-after-free of client_id</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37916</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:25:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="164">
    <vuln:Title>Bluetooth: btusb: avoid NULL pointer dereference in skb_dequeue()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37918</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:59:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="166">
    <vuln:Title>vxlan: vnifilter: Fix unlocked deletion of default FDB entry</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37921</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:02:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="167">
    <vuln:Title>book3s64/radix : Align section vmemmap start address to PAGE_SIZE</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37922</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:03:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="171">
    <vuln:Title>iommu/amd: Fix potential buffer overflow in parse_ivrs_acpihid</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37927</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:22:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="173">
    <vuln:Title>drm/nouveau: Fix WARN_ON in nouveau_fence_context_kill()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37930</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.5</vuln:BaseScore>
        <vuln:TemporalScore>2.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:18:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="175">
    <vuln:Title>sch_htb: make htb_qlen_notify() idempotent</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37932</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>2.5</vuln:BaseScore>
        <vuln:TemporalScore>2.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.200.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-21T01:01:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:40:45</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-12-23T01:36:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-02-24T14:38:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="176">
    <vuln:Title>octeon_ep: Fix host hang issue during device reboot</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37933</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.6</vuln:BaseScore>
        <vuln:TemporalScore>5.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:54:46</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="178">
    <vuln:Title>tracing: Verify event formats that have "%*p.."</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37938</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-21T01:01:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:50:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:46:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:57:54</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-12-23T01:36:45</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="179">
    <vuln:Title>ftrace: Add cond_resched() to ftrace_graph_set_hash()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37940</vuln:CVE>
    <vuln:CWE
      ID="CWE-667">Improper Locking</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:02:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="182">
    <vuln:Title>wifi: ath12k: Fix invalid entry fetch in ath12k_dp_mon_srng_process</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37944</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37944</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37944</vuln:CVE>
    <vuln:CWE
      ID="CWE-787">Out-of-bounds Write</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37944</vuln:URL>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37944</vuln:URL>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:04:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="185">
    <vuln:Title>arm64: bpf: Add BHB mitigation to the epilogue for cBPF programs</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37948</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:18:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="186">
    <vuln:Title>drm/v3d: Add job to pending list if the reset was skipped</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37951</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37951</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37951</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37951</vuln:URL>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37951</vuln:URL>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-19T01:01:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-13T01:40:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:54:15</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="187">
    <vuln:Title>ksmbd: Fix UAF in __close_file_table_ids</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37952</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-19T01:02:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:37:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:04:27</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="190">
    <vuln:Title>KVM: SVM: Forcibly leave SMM mode on SHUTDOWN interception</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37957</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T15:03:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:43:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:34:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="191">
    <vuln:Title>mm/huge_memory: fix dereferencing invalid pmd migration entry</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37958</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17085-17084</vuln:ProductID>
        <vuln:ProductID>19880-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17085-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19880-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17085-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19880-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19880-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17085-17084</vuln:ProductID>
        <vuln:ProductID>19880-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.96.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17085-17084</vuln:ProductID>
        <vuln:ProductID>19880-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:44:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-08-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="196">
    <vuln:Title>usb: typec: ucsi: displayport: Fix deadlock</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37967</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37967</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37967</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37967</vuln:URL>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37967</vuln:URL>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:24:15</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="198">
    <vuln:Title>iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_tagged_fifo</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37969</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:05:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="199">
    <vuln:Title>iio: imu: st_lsm6dsx: fix possible lockup in st_lsm6dsx_read_fifo</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37970</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:26:27</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="200">
    <vuln:Title>Input: mtk-pmic-keys - fix possible null pointer dereference</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37972</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:50:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="204">
    <vuln:Title>ASoC: qcom: Fix sc7280 lpass potential buffer overflow</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37979</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:38:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="205">
    <vuln:Title>block: fix resource leak in blk_register_queue() error path</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37980</vuln:CVE>
    <vuln:CWE
      ID="CWE-401">Missing Release of Memory after Effective Lifetime</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:43:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-18T01:38:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:25:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-03T15:03:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="206">
    <vuln:Title>wifi: wl1251: fix memory leak in wl1251_tx_work</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37982</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:04:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="210">
    <vuln:Title>pds_core: Prevent possible adminq overflow/stuck condition</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37987</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19880-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19880-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19880-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19880-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19880-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.96.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19880-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-19T01:51:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-08-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="211">
    <vuln:Title>fix a couple of races in MNT_TREE_BENEATH handling by do_move_mount()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37988</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:45:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="212">
    <vuln:Title>net: phy: leds: fix memory leak</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37989</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:05:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="213">
    <vuln:Title>wifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37990</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.7</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:22:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="215">
    <vuln:Title>usb: typec: ucsi: displayport: Fix NULL pointer access</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37994</vuln:Note>
      <vuln:Note
        Title="NIST NVD Details"
        Type="Other"
        Ordinal="1">https://nvd.nist.gov/vuln/detail/CVE-2025-37994</vuln:Note>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37994</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12356</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>12357</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.x86_64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37994</vuln:URL>
        <vuln:ProductID>12356</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>kernel</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-devel-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-accessibility-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-gpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-intree-amdgpu-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-drivers-sound-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-docs-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-tools-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>python3-perf-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>bpftool-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
          <vuln:AffectedFile>
            <vuln:FileName>kernel-debuginfo-6.6.92.2-1.azl3.aarch64.rpm</vuln:FileName>
            <vuln:FileLastModified>0001-01-01T00:00:00</vuln:FileLastModified>
          </vuln:AffectedFile>
        </vuln:AffectedFiles>
        <vuln:RestartRequired />
        <vuln:SubType>CBL-Mariner</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://nvd.nist.gov/vuln/detail/CVE-2025-37994</vuln:URL>
        <vuln:ProductID>12357</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>kernel</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T14:28:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="216">
    <vuln:Title>module: ensure that kobject_put() is safe for module type kobjects</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37995</vuln:CVE>
    <vuln:CWE
      ID="CWE-824">Access of Uninitialized Pointer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T02:25:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="218">
    <vuln:Title>openvswitch: Fix unsafe attribute parsing in output_userspace()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37998</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.5</vuln:BaseScore>
        <vuln:TemporalScore>4.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T03:00:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="220">
    <vuln:Title>Perl threads have a working directory race condition where file operations may target unintended paths</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="CPANSec"
        Type="CNA"
        Ordinal="30">CPANSec</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-40909</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization (&amp;#39;Race Condition&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19554-16823</vuln:ProductID>
        <vuln:ProductID>20310-17086</vuln:ProductID>
        <vuln:ProductID>20313-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19554-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20310-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20313-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19554-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20310-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20313-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19554-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20310-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20313-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19554-16823</vuln:ProductID>
        <vuln:ProductID>20310-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.34.1-491</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19554-16823</vuln:ProductID>
        <vuln:ProductID>20310-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20313-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.38.2-509</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20313-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:26:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="225">
    <vuln:Title>Libsoup: null pointer dereference in libsoup may lead to denial of service</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4476</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19551-16823</vuln:ProductID>
        <vuln:ProductID>19596-17084</vuln:ProductID>
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19551-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19596-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19551-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19596-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19551-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19596-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.3</vuln:BaseScore>
        <vuln:TemporalScore>4.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>20186-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19551-16823</vuln:ProductID>
        <vuln:ProductID>20186-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.0.4-7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19551-16823</vuln:ProductID>
        <vuln:ProductID>20186-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19596-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.4.4-7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19596-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T02:55:48</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="228">
    <vuln:Title>Use-after-free in "unicode_escape" decoder with error handler</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="PSF"
        Type="CNA"
        Ordinal="30">PSF</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4516</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19533-16823</vuln:ProductID>
        <vuln:ProductID>19601-17084</vuln:ProductID>
        <vuln:ProductID>19681-17086</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19533-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19601-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19681-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19533-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19601-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19681-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19533-16823</vuln:ProductID>
        <vuln:ProductID>19681-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.9.19-14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19533-16823</vuln:ProductID>
        <vuln:ProductID>19681-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19601-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.12.9-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19601-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2026-02-21T02:51:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-07-18T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added python3 to CBL-Mariner 2.0
Added python3 to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="229">
    <vuln:Title>Crossbeam-channel: crossbeam-channel vulnerable to double free on drop</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4574</vuln:CVE>
    <vuln:CWE
      ID="CWE-415">Double Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19603-17084</vuln:ProductID>
        <vuln:ProductID>20254-17084</vuln:ProductID>
        <vuln:ProductID>20421-17084</vuln:ProductID>
        <vuln:ProductID>20824-17084</vuln:ProductID>
        <vuln:ProductID>21129-17084</vuln:ProductID>
        <vuln:ProductID>21252-17084</vuln:ProductID>
        <vuln:ProductID>20257-17084</vuln:ProductID>
        <vuln:ProductID>20258-17086</vuln:ProductID>
        <vuln:ProductID>20259-17084</vuln:ProductID>
        <vuln:ProductID>20971-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19603-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20254-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20421-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20824-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21129-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21252-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20257-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20258-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20259-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20971-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19603-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>20254-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20421-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20824-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21129-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21252-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20257-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20258-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20259-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20971-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19603-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20254-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20421-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20824-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>21129-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>21252-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20257-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20258-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20259-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20971-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19603-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.75.0-16</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19603-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20257-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.86.0-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20257-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20258-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.2-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20258-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20259-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.18.0.kata0-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20259-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:40:10</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.1</cvrf:Number>
        <cvrf:Date>2026-02-21T02:48:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:39:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:53:45</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:46:22</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-08-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added kata-containers to Azure Linux 3.0
Added rust to Azure Linux 3.0
Added azl-compliance to CBL-Mariner 2.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="232">
    <vuln:Title>OPA server Data API HTTP path injection of Rego</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-46569</vuln:CVE>
    <vuln:CWE
      ID="CWE-863">Incorrect Authorization</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19604-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19604-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19604-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19604-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.63.0-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19604-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="237">
    <vuln:Title>undici Denial of Service attack via bad certificate data</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-47279</vuln:CVE>
    <vuln:CWE
      ID="CWE-401">Missing Release of Memory after Effective Lifetime</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19608-17084</vuln:ProductID>
        <vuln:ProductID>19873-17086</vuln:ProductID>
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19608-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19873-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19608-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19873-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.1</vuln:BaseScore>
        <vuln:TemporalScore>3.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19608-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.1</vuln:BaseScore>
        <vuln:TemporalScore>3.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19873-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>3.1</vuln:BaseScore>
        <vuln:TemporalScore>3.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L</vuln:Vector>
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19608-17084</vuln:ProductID>
        <vuln:ProductID>19904-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20.14.0-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19608-17084</vuln:ProductID>
        <vuln:ProductID>19904-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19873-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.20.3-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19873-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T02:54:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="238">
    <vuln:Title>containerd CRI plugin: Incorrect cgroup hierarchy assignment for containers running in usernamespaced Kubernetes pods.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-47291</vuln:CVE>
    <vuln:CWE
      ID="CWE-266">Incorrect Privilege Assignment</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19609-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19609-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19609-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19609-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19609-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.0.0-12</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19609-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="240">
    <vuln:Title>AddressSanitizer: stack-buffer-overflow in jq_fuzz_execute (jv_string_vfmt)</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-48060</vuln:CVE>
    <vuln:CWE
      ID="CWE-121">Stack-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19565-16823</vuln:ProductID>
        <vuln:ProductID>19612-17084</vuln:ProductID>
        <vuln:ProductID>20251-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19565-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19612-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20251-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19565-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19612-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20251-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19565-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19612-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20251-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19565-16823</vuln:ProductID>
        <vuln:ProductID>20251-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.6-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19565-16823</vuln:ProductID>
        <vuln:ProductID>20251-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19612-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.7.1-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19612-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-29T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:06:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="241">
    <vuln:Title>Prevent GitHub CLI and extensions from executing arbitrary commands from compromised GitHub Enterprise Server</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="GitHub_M"
        Type="CNA"
        Ordinal="30">GitHub_M</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-48938</vuln:CVE>
    <vuln:CWE
      ID="CWE-501">Trust Boundary Violation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19613-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>19613-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19613-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.62.0-9</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19613-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-08-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="242">
    <vuln:Title>QUIC certificate check skip with wolfSSL</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="curl"
        Type="CNA"
        Ordinal="30">curl</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4947</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19616-17084</vuln:ProductID>
        <vuln:ProductID>19799-17086</vuln:ProductID>
        <vuln:ProductID>19852-17086</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>17153-17086</vuln:ProductID>
        <vuln:ProductID>19252-17084</vuln:ProductID>
        <vuln:ProductID>17539-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19616-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19799-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19852-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17153-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19252-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17539-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19616-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19799-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19852-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17153-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19252-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17539-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19616-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19799-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19852-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17153-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19252-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17539-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19616-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.30.3-7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19616-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19799-17086</vuln:ProductID>
        <vuln:ProductID>19852-17086</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>19252-17084</vuln:ProductID>
        <vuln:ProductID>17539-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19799-17086</vuln:ProductID>
        <vuln:ProductID>19852-17086</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>19252-17084</vuln:ProductID>
        <vuln:ProductID>17539-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-11T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-08-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added mysql to CBL-Mariner 2.0
Added cmake to Azure Linux 3.0&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-02-21T03:18:33</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="245">
    <vuln:Title>No QUIC certificate pinning with wolfSSL</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="curl"
        Type="CNA"
        Ordinal="30">curl</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5025</vuln:CVE>
    <vuln:CWE
      ID="CWE-295">Improper Certificate Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17464-17084</vuln:ProductID>
        <vuln:ProductID>19852-17086</vuln:ProductID>
        <vuln:ProductID>19252-17084</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>19799-17086</vuln:ProductID>
        <vuln:ProductID>19721-17086</vuln:ProductID>
        <vuln:ProductID>19686-17084</vuln:ProductID>
        <vuln:ProductID>17539-17084</vuln:ProductID>
        <vuln:ProductID>19671-17084</vuln:ProductID>
        <vuln:ProductID>17153-17086</vuln:ProductID>
        <vuln:ProductID>17183-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17464-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19852-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19252-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19799-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19721-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17539-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17153-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17183-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17464-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19852-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19252-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19799-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19721-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17539-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17153-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17183-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17464-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19852-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19252-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19799-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19721-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19686-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17539-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>19671-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17153-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.8</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N</vuln:Vector>
        <vuln:ProductID>17183-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17464-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.30.3-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17464-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-08-06T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-21T03:24:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="246">
    <vuln:Title>Icu: stack buffer overflow in the srbroot::addtag function</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5222</vuln:CVE>
    <vuln:CWE
      ID="CWE-120">Buffer Copy without Checking Size of Input (&amp;#39;Classic Buffer Overflow&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19571-16823</vuln:ProductID>
        <vuln:ProductID>20165-17084</vuln:ProductID>
        <vuln:ProductID>17667-17084</vuln:ProductID>
        <vuln:ProductID>20367-17086</vuln:ProductID>
        <vuln:ProductID>20162-17086</vuln:ProductID>
        <vuln:ProductID>19904-17084</vuln:ProductID>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19571-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20165-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20367-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20162-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19571-16823</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20165-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20367-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20162-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19571-16823</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20165-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17667-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20367-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20162-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19904-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19668-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19571-16823</vuln:ProductID>
        <vuln:ProductID>20162-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>68.2.0.9-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19571-16823</vuln:ProductID>
        <vuln:ProductID>20162-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20165-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>72.1.0.3-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20165-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20367-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>18.20.3-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20367-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19904-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>20.14.0-10</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19904-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T04:27:22</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-08-14T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="248">
    <vuln:Title>GNU Binutils objdump debug.c debug_type_samep memory corruption</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="VulDB"
        Type="CNA"
        Ordinal="30">VulDB</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5245</vuln:CVE>
    <vuln:CWE
      ID="CWE-119">Improper Restriction of Operations within the Bounds of a Memory Buffer</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19621-17084</vuln:ProductID>
        <vuln:ProductID>20219-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19621-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20219-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19621-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20219-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>19621-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.3</vuln:BaseScore>
        <vuln:TemporalScore>5.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</vuln:Vector>
        <vuln:ProductID>20219-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19621-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.41-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19621-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20219-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.37-15</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20219-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-07-10T00:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-21T03:09:10</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="130">
    <vuln:Title>scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37861</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.1</vuln:BaseScore>
        <vuln:TemporalScore>4.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:45:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:45:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:43:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-03T15:00:30</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:40:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:55:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:46:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:40:50</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T21:49:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:40:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:41:53</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>12.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:41:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="91">
    <vuln:Title>ksmbd: fix WARNING "do not call blocking ops when !TASK_RUNNING"</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37802</vuln:CVE>
    <vuln:CWE
      ID="CWE-667">Improper Locking</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
        <vuln:ProductID>18490-17086</vuln:ProductID>
        <vuln:ProductID>19682-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>18490-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19682-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>18490-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19682-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>18490-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19682-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-03T22:03:53</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:51:47</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="239">
    <vuln:Title>Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="glibc"
        Type="CNA"
        Ordinal="30">glibc</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4802</vuln:CVE>
    <vuln:CWE
      ID="CWE-426">Untrusted Search Path</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19876-17086</vuln:ProductID>
        <vuln:ProductID>19587-17084</vuln:ProductID>
        <vuln:ProductID>20426-17084</vuln:ProductID>
        <vuln:ProductID>20868-17086</vuln:ProductID>
        <vuln:ProductID>17348-17086</vuln:ProductID>
        <vuln:ProductID>20935-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19876-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19587-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20426-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20868-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17348-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20935-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19876-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19587-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20426-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20868-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17348-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20935-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>8.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19876-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>8.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19587-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>8.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20426-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>8.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20868-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>8.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17348-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>8.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20935-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19876-17086</vuln:ProductID>
        <vuln:ProductID>20868-17086</vuln:ProductID>
        <vuln:ProductID>17348-17086</vuln:ProductID>
        <vuln:ProductID>20935-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.35-8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19876-17086</vuln:ProductID>
        <vuln:ProductID>20868-17086</vuln:ProductID>
        <vuln:ProductID>17348-17086</vuln:ProductID>
        <vuln:ProductID>20935-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20426-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.38-12</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20426-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T00:02:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-21T02:52:45</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:36:55</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="208">
    <vuln:Title>crypto: ecdsa - Harden against integer overflows in DIV_ROUND_UP()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37984</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:05:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:34:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="96">
    <vuln:Title>bpf: Fix kmemleak warning for percpu hashmap</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37807</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:ProductID>20412-17084</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20412-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:13:30</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:38:16</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:48:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-19T01:49:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:56:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:43:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:15:15</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:53:48</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:35:20</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:48:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:46:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>12.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:47:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="203">
    <vuln:Title>scsi: ufs: exynos: Disable iocc if dma-coherent property isn't set</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37977</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T01:30:15</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:38:59</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="202">
    <vuln:Title>Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37976</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U</vuln:Vector>
        <vuln:ProductID>19529-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T02:20:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:46:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="50">
    <vuln:Title>wifi: ath12k: fix memory leak in ath12k_pci_remove()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37744</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19683-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.96.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19683-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-18T01:47:38</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T02:23:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="223">
    <vuln:Title>Glib: buffer underflow on glib through glib/gstring.c via function g_string_insert_unichar</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="redhat"
        Type="CNA"
        Ordinal="30">redhat</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4373</vuln:CVE>
    <vuln:CWE
      ID="CWE-124">Buffer Underwrite (&amp;#39;Buffer Underflow&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19898-17086</vuln:ProductID>
        <vuln:ProductID>20365-17086</vuln:ProductID>
        <vuln:ProductID>20466-17086</vuln:ProductID>
        <vuln:ProductID>20272-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19898-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20365-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20466-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20272-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>19898-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20365-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20466-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20272-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U</vuln:Vector>
        <vuln:ProductID>19898-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U</vuln:Vector>
        <vuln:ProductID>20365-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U</vuln:Vector>
        <vuln:ProductID>20466-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>6.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U</vuln:Vector>
        <vuln:ProductID>20272-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19898-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.71.0-6</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19898-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20365-17086</vuln:ProductID>
        <vuln:ProductID>20466-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.71.0-7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20365-17086</vuln:ProductID>
        <vuln:ProductID>20466-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20272-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.78.6-3</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20272-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-04T02:58:55</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2026-02-19T01:41:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="76">
    <vuln:Title>Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37782</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T14:10:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-10-01T23:11:35</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="93">
    <vuln:Title>Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37804</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>19734-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.92.2-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>19734-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-10-01T23:11:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-18T01:52:48</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title>Insecure file handling vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is Azure Linux the only Microsoft product that includes this open-source library and is therefore potentially affected by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;One of the main benefits to our customers who choose to use the Azure Linux distro is the commitment to keep it up to date with the most recent and most secure versions of the open source libraries with which the distro is composed. Microsoft is committed to transparency in this work which is why we began publishing CSAF/VEX in October 2025.  See &lt;a href="https://www.microsoft.com/en-us/msrc/blog/2025/10/toward-greater-transparency-machine-readable-vulnerability-exploitability-xchange-for-azure-linux"&gt;this blog&lt;/a&gt; post for more information. If impact to additional products is identified, we will update the CVE to reflect this.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="vmware"
        Type="CNA"
        Ordinal="30">vmware</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-22247</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access (&amp;#39;Link Following&amp;#39;)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20462-17086</vuln:ProductID>
        <vuln:ProductID>20463-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20462-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20463-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20462-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20463-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N</vuln:Vector>
        <vuln:ProductID>20462-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.1</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N</vuln:Vector>
        <vuln:ProductID>20463-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20462-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>11.3.0-4</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20462-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20463-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>12.3.5-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20463-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-09-27T01:03:15</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title>net: Fix null-ptr-deref by sock_lock_init_class_and_name() and rmmod.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-23143</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>5.15.200.1-1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>CBL-Mariner Releases</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.6.112.1-2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade</vuln:URL>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>CBL-Mariner Releases</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-07T01:01:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-02-24T14:35:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>perf: Fix hang while freeing sigtrap event</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37747</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20553-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20553-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:46:46</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:55:56</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:53:13</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:48:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:41:57</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-07T01:01:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:37:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:48:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:42:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:07:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:43:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>12.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:43:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="11">
    <vuln:Title>iavf: fix hang on reboot with ice</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-53064</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-08T01:02:25</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title>netlink: Bounds-check struct nlmsgerr creation</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-49766</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:53:45</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:07:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-08T01:08:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="54">
    <vuln:Title>smb: client: fix UAF in decryption with multichannel</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37750</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20725-17084</vuln:ProductID>
        <vuln:ProductID>20823-17084</vuln:ProductID>
        <vuln:ProductID>20860-17084</vuln:ProductID>
        <vuln:ProductID>20956-17084</vuln:ProductID>
        <vuln:ProductID>21094-17084</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20613-17084</vuln:ProductID>
        <vuln:ProductID>20788-17084</vuln:ProductID>
        <vuln:ProductID>21248-17084</vuln:ProductID>
        <vuln:ProductID>21308-17084</vuln:ProductID>
        <vuln:ProductID>21332-17084</vuln:ProductID>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20725-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20823-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20860-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20956-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21094-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20613-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20788-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21248-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21308-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21332-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21344-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-08T01:08:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-07T01:46:55</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-01-08T14:37:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>6.0</cvrf:Number>
        <cvrf:Date>2026-03-04T14:42:39</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>7.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:08:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>4.0</cvrf:Number>
        <cvrf:Date>2026-01-20T14:48:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>5.0</cvrf:Number>
        <cvrf:Date>2026-02-18T02:56:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>8.0</cvrf:Number>
        <cvrf:Date>2026-04-29T14:49:12</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>9.0</cvrf:Number>
        <cvrf:Date>2026-05-06T14:43:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>10.0</cvrf:Number>
        <cvrf:Date>2026-05-11T01:42:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>11.0</cvrf:Number>
        <cvrf:Date>2026-05-17T14:43:13</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="4">
    <vuln:Title>drm/scheduler: fix fence ref counting</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-49829</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-12T01:01:21</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:55:11</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:09:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title>btrfs: zoned: clone zoned device info when cloning a device</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-49833</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-12T01:01:26</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:55:28</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:10:06</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="6">
    <vuln:Title>octeontx2-pf: Fix SQE threshold checking</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-49858</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-12T01:01:32</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-11-25T01:40:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="16">
    <vuln:Title>net/mlx5e: Fix cleanup null-ptr deref on encap lock</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-53105</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-12T01:01:38</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:55:46</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T15:10:31</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="172">
    <vuln:Title>dm-bufio: don't schedule in atomic context</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37928</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-12T01:02:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title>KVM: VMX: Do _all_ initialization before exposing /dev/kvm to userspace</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2022-49932</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:58:10</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-14T01:03:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:37:52</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title>drm/amd/display: Do not set DRR on pipe Commit</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-53042</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-14T01:03:29</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:58:44</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:38:37</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="13">
    <vuln:Title>mptcp: use the workqueue to destroy unaccepted sockets</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-53072</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-14T01:03:40</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="14">
    <vuln:Title>drm/amdgpu: fix ttm_bo calltrace warning in psp_hw_fini</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-53074</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-14T01:03:45</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:59:18</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:39:24</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="15">
    <vuln:Title>tracing: Do not let histogram values have some modifiers</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2023-53093</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:39:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-14T01:03:51</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:59:36</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="103">
    <vuln:Title>xen-netfront: handle NULL returned by xdp_convert_buff_to_frame()</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37820</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-11-14T01:03:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:59:54</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:40:17</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="226">
    <vuln:Title>hdf5 v1.14.6 was discovered to contain a heap buffer overflow via the H5VM_memcpyvv function.</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="mitre"
        Type="CNA"
        Ordinal="30">mitre</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-44904</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>20762-17086</vuln:ProductID>
        <vuln:ProductID>21121-17084</vuln:ProductID>
        <vuln:ProductID>21122-17086</vuln:ProductID>
        <vuln:ProductID>20755-17084</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20762-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21121-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21122-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20755-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20762-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21121-17084</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>21122-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>20755-17084</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20762-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21121-17084</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>21122-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>8.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</vuln:Vector>
        <vuln:ProductID>20755-17084</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-12-20T01:03:15</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:47:23</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-12-16T01:01:34</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="192">
    <vuln:Title>bpf: Scrub packet on bpf_redirect_peer</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0" />
      <vuln:Note
        Title="Mariner"
        Type="Tag"
        Ordinal="20">Mariner</vuln:Note>
      <vuln:Note
        Title="Linux"
        Type="CNA"
        Ordinal="30">Linux</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-37959</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>17087-17086</vuln:ProductID>
        <vuln:ProductID>20925-17086</vuln:ProductID>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Moderate</vuln:Description>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>17087-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>20925-17086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>5.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H</vuln:Vector>
        <vuln:ProductID>21093-17086</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-12-18T01:01:19</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2026-03-03T14:42:42</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>3.0</cvrf:Number>
        <cvrf:Date>2026-03-31T14:51:03</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="77">
    <vuln:Title>Chromium: CVE-2025-4050 Out of bounds memory access in DevTools</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%C2%A05"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;136.0.3240.50&lt;/td&gt;
&lt;td&gt;5/1/2025&lt;/td&gt;
&lt;td&gt;136.0.7103.49&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4050</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>136.0.3240.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Corrected CVE title. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-01T22:15:58</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="80">
    <vuln:Title>Chromium: CVE-2025-4096 Heap buffer overflow in HTML</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%C2%A05"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;136.0.3240.50&lt;/td&gt;
&lt;td&gt;5/1/2025&lt;/td&gt;
&lt;td&gt;136.0.7103.49&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4096</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>136.0.3240.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Corrected CVE title. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-01T22:15:53</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="85">
    <vuln:Title>Microsoft Edge (Chromium-based) Update Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper link resolution before file access ('link following') in Microsoft Edge (Chromium-based) allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An exploited vulnerability can affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component and the impacted component are different and managed by different security authorities.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.&lt;/p&gt;
&lt;p&gt;Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-47181</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access ('Link Following')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12101</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12101</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12101</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12101</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>12101</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.3.195.61</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>12101</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/sim0nsecurity"&gt;Simon (@sim0nsecurity)&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-22T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="3">
    <vuln:Title>.NET, Visual Studio, and Build Tools for Visual Studio Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R) and privileges required  is low (PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authorized attacker with standard user privileges could place a malicious file and then wait for the privileged victim to run the calling command.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title=".NET, Visual Studio, and Build Tools for Visual Studio"
        Type="Tag"
        Ordinal="20">.NET, Visual Studio, and Build Tools for Visual Studio</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-26646</vuln:CVE>
    <vuln:CWE
      ID="CWE-73">External Control of File Name or Path</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12414</vuln:ProductID>
        <vuln:ProductID>12415</vuln:ProductID>
        <vuln:ProductID>12416</vuln:ProductID>
        <vuln:ProductID>12432</vuln:ProductID>
        <vuln:ProductID>12433</vuln:ProductID>
        <vuln:ProductID>12434</vuln:ProductID>
        <vuln:ProductID>12459</vuln:ProductID>
        <vuln:ProductID>12506</vuln:ProductID>
        <vuln:ProductID>12271</vuln:ProductID>
        <vuln:ProductID>12322</vuln:ProductID>
        <vuln:ProductID>16763</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12414</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12415</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12416</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12432</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12433</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12434</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12459</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12506</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12271</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>16763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12414</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12415</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12416</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12432</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12433</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12434</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12459</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12506</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12271</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12414</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12415</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12416</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12432</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12433</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12434</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12459</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12506</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12271</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.0</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16763</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5059200</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/en-us/download/dotnet/8.0</vuln:URL>
        <vuln:ProductID>12414</vuln:ProductID>
        <vuln:ProductID>12415</vuln:ProductID>
        <vuln:ProductID>12416</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>8.0.16</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5059200</vuln:URL>
        <vuln:ProductID>12414</vuln:ProductID>
        <vuln:ProductID>12415</vuln:ProductID>
        <vuln:ProductID>12416</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5059200</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5059201</vuln:Description>
        <vuln:URL>https://dotnet.microsoft.com/en-us/download/dotnet/9.0</vuln:URL>
        <vuln:ProductID>12432</vuln:ProductID>
        <vuln:ProductID>12433</vuln:ProductID>
        <vuln:ProductID>12434</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>9.0.5</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5059201</vuln:URL>
        <vuln:ProductID>12432</vuln:ProductID>
        <vuln:ProductID>12433</vuln:ProductID>
        <vuln:ProductID>12434</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5059201</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.12</vuln:URL>
        <vuln:ProductID>12459</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.12.8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12459</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.13</vuln:URL>
        <vuln:ProductID>12506</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.13.7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12506</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.8</vuln:URL>
        <vuln:ProductID>12271</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.8.21</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12271</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.10</vuln:URL>
        <vuln:ProductID>12322</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.10.15</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12322</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022</vuln:URL>
        <vuln:ProductID>16763</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>Fixed Version 17.13.7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>16763</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-22T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;To comprehensively address CVE-2025-26646, Microsoft has released security updates on May 22, 2025 for Visual Studio 2022 version 17.10. In addition, updates .NET 8.0.313 and .NET 8.0.410 have been released for .NET SDKs 8.0.3xx and 8.0.4xx, respectively. For more information about the .NET updates see &lt;a href="https://support.microsoft.com/en-us/topic/-net-8-0-update-may-22-2025-kb5059200-8ace2b08-2644-454e-a43f-157c60835e49"&gt;KB5059200&lt;/a&gt;.   Microsoft recommends customers to install these updates to be fully protected from the vulnerability.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="5">
    <vuln:Title>Microsoft Defender Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;External control of file name or path in Microsoft Defender for Endpoint allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How can I verify that the update is installed?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Customers wanting to ensure the client has been updated can run the MDE Client Analyzer on the device.  When running the analyzer on a Windows device that does not have the security update, the analyzer will present a warning (ID 121035) indicating missing patch and directing to relevant online article.  Additionally, if the update is installed, but the Anti-Spoofing capability is not in a stable state, the analyzer will present warning (ID 121036) indicating an issue and providing additional online guidance or callout to reach out to Microsoft support if issue persists.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Defender for Endpoint"
        Type="Tag"
        Ordinal="20">Microsoft Defender for Endpoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-26684</vuln:CVE>
    <vuln:CWE
      ID="CWE-73">External Control of File Name or Path</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12015</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12015</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12015</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12015</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/defender-endpoint/linux-whatsnew#releases-for-defender-for-endpoint-on-linux</vuln:URL>
        <vuln:ProductID>12015</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>101.25032.0010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/defender-endpoint/linux-whatsnew#releases-for-defender-for-endpoint-on-linux</vuln:URL>
        <vuln:ProductID>12015</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Rich Mirch with &lt;a href="https://www.stratascale.com/"&gt;Stratascale&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>astraleureka (eureka@astr.al)</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-07-08T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated links to security updates.  This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2025-07-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated the build numbers.  This is an informational update only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="10">
    <vuln:Title>Microsoft Edge (Chromium-based) Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The user would have to click on a specially crafted URL to be compromised by the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;136.0.3240.50&lt;/td&gt;
&lt;td&gt;5/1/2025&lt;/td&gt;
&lt;td&gt;136.0.7103.49&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29825</vuln:CVE>
    <vuln:CWE
      ID="CWE-451">User Interface (UI) Misrepresentation of Critical Information</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Low</vuln:Description>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely;Older Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>136.0.3240.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>zeeagil</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-01T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="31">
    <vuln:Title>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Routing and Remote Access Service (RRAS)"
        Type="Tag"
        Ordinal="20">Windows Routing and Remote Access Service (RRAS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29959</vuln:CVE>
    <vuln:CWE
      ID="CWE-908">Use of Uninitialized Resource</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="32">
    <vuln:Title>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In a web-based attack scenario, an attacker could host a website or server that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Routing and Remote Access Service (RRAS)"
        Type="Tag"
        Ordinal="20">Windows Routing and Remote Access Service (RRAS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29960</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="36">
    <vuln:Title>Windows Media Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack requires a user to open a specially crafted file from the attacker to initiate remote code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Media"
        Type="Tag"
        Ordinal="20">Windows Media</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29964</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="37">
    <vuln:Title>Remote Desktop Client Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Heap-based buffer overflow in Windows Remote Desktop allows an unauthorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacker's server with the vulnerable Remote Desktop Client.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Remote Desktop"
        Type="Tag"
        Ordinal="20">Windows Remote Desktop</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29966</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12457</vuln:ProductID>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11849</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12457</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11849</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12457</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11849</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12457</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11849</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/windows-app/whats-new?toc=admins%2Ftoc.json&amp;tabs=windows</vuln:URL>
        <vuln:ProductID>12457</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.0.420</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/windows-app/whats-new?toc=admins%2Ftoc.json&amp;tabs=windows</vuln:URL>
        <vuln:ProductID>12457</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/azure/virtual-desktop/whats-new-client-windows#updates-for-version-1260810</vuln:URL>
        <vuln:ProductID>11849</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.2.6228.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/virtual-desktop/whats-new-client-windows#updates-for-version-1260810</vuln:URL>
        <vuln:ProductID>11849</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Nicholas Vadasz</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="38">
    <vuln:Title>Remote Desktop Client Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Heap-based buffer overflow in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacker's server with the vulnerable Remote Desktop Client.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Remote Desktop Gateway Service"
        Type="Tag"
        Ordinal="20">Remote Desktop Gateway Service</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29967</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12457</vuln:ProductID>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11849</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12457</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11849</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12457</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11849</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12457</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11849</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/windows-app/whats-new?toc=admins%2Ftoc.json&amp;tabs=windows</vuln:URL>
        <vuln:ProductID>12457</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>2.0.420</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/windows-app/whats-new?toc=admins%2Ftoc.json&amp;tabs=windows</vuln:URL>
        <vuln:ProductID>12457</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/azure/virtual-desktop/whats-new-client-windows#updates-for-version-1260810</vuln:URL>
        <vuln:ProductID>11849</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.2.6228.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/virtual-desktop/whats-new-client-windows#updates-for-version-1260810</vuln:URL>
        <vuln:ProductID>11849</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Nicholas Vadasz</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="39">
    <vuln:Title>Active Directory Certificate Services (AD CS) Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper input validation in Active Directory Certificate Services (AD CS) allows an authorized attacker to deny service over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Active Directory Certificate Services (AD CS)"
        Type="Tag"
        Ordinal="20">Active Directory Certificate Services (AD CS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29968</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="40">
    <vuln:Title>MS-EVEN RPC Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Time-of-check time-of-use (toctou) race condition in Windows Fundamentals allows an authorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to have obtained low privileged code execution on target host first.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Fundamentals"
        Type="Tag"
        Ordinal="20">Windows Fundamentals</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29969</vuln:CVE>
    <vuln:CWE
      ID="CWE-367">Time-of-check Time-of-use (TOCTOU) Race Condition</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Yarin Aharoni with &lt;a href="https://www.safebreach.com/"&gt;SafeBreach&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="41">
    <vuln:Title>Microsoft Brokering File System Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Brokering File System"
        Type="Tag"
        Ordinal="20">Microsoft Brokering File System</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29970</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Maxime Villard, of M.O.R.S.E.</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>hazard</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="42">
    <vuln:Title>Web Threat Defense (WTD.sys) Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Web Threat Defense (WTD.sys) allows an unauthorized attacker to deny service over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Web Threat Defense (WTD.sys)"
        Type="Tag"
        Ordinal="20">Web Threat Defense (WTD.sys)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29971</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5061258</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5061258</vuln:URL>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security HotPatch Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3983</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5061258</vuln:URL>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5061258</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Vladimir Lagunov with &lt;a href="https://jetbrains.com/"&gt;JetBrains&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-16T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;To comprehensively address CVE-2025-29971, Microsoft has released HotPatch KB5061258 for Windows 11 Version 24H2 for x64-based Systems and Windows 11 Version 24H2 for ARM64-based Systems. Customers running these versions of Windows and who install the HotPatch updates should install KB5061258 to be protected from this vulnerability.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="44">
    <vuln:Title>Microsoft Azure File Sync Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What actions do customers need to take to protect themselves from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability has been mitigated by a recent update to Azure File Sync's backend infrastructure and no Azure File Sync agent upgrade needed to the latest version.. Customers who are required to inspect and correct their Access Control List's have been notified through &lt;a href="https://learn.microsoft.com/en-us/azure/service-health/overview"&gt;Azure Service Health Alerts&lt;/a&gt; under TrackingID: 4K2C-9_Z . See &lt;a href="https://learn.microsoft.com/en-us/azure/service-health/service-notifications"&gt;View service health notifications by using the Azure portal&lt;/a&gt; for information on how to view Azure Service Health Alerts in the Azure Portal.&lt;/p&gt;
&lt;p&gt;Customers who have not received this Azure Service Health Alert do not need to take any action to be protected against this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To successfully exploit this vulnerability, an attacker would need to gain elevated privileges enabling them to perform file operations in directories they would not normally be able to access or perform.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker can gain permissions to access directories in Azure File Sync servers and perform file operations they do not normally have permissions to access or perform.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure File Sync"
        Type="Tag"
        Ordinal="20">Azure File Sync</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29973</vuln:CVE>
    <vuln:CWE
      ID="CWE-284">Improper Access Control</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16746</vuln:ProductID>
        <vuln:ProductID>16747</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16746</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16747</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16746</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16747</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16746</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16747</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16746</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>N/A</vuln:SubType>
        <vuln:FixedBuild>26100</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/en-us/topic/azure-file-sync-agent-v19-release-september-2024-e44fc142-8a24-4dea-9bf9-6e884b4b342e</vuln:URL>
        <vuln:ProductID>16746</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>16747</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>N/A</vuln:SubType>
        <vuln:FixedBuild>5041884</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/en-us/topic/azure-file-sync-agent-v20-release-february-2025-b92c9c6f-8232-42d3-a3e0-e6df1fce0f5e</vuln:URL>
        <vuln:ProductID>16747</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="46">
    <vuln:Title>Microsoft PC Manager Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper link resolution before file access ('link following') in Microsoft PC Manager allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft PC Manager"
        Type="Tag"
        Ordinal="20">Microsoft PC Manager</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29975</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access ('Link Following')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12441</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12441</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12441</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12441</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://apps.microsoft.com/detail/9pm860492szd?hl=en-us&amp;gl=US</vuln:URL>
        <vuln:ProductID>12441</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.16.1.0</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://apps.microsoft.com/detail/9pm860492szd?hl=en-us&amp;gl=US</vuln:URL>
        <vuln:ProductID>12441</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/sim0nsecurity"&gt;Simon (@sim0nsecurity)&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous working with Trend Zero Day Initiative</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2025-05-20T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated acknowledgment. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated acknowledgment. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="47">
    <vuln:Title>Microsoft SharePoint Server Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper privilege management in Microsoft Office SharePoint allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited the vulnerability could elevate privileges and gain the ability to read the load file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;I am running SharePoint Enterprise Server 2016 or SharePoint Server 2019 and there are multiple updates available for each of these affected versions. Do I need to install all the updates listed in the Security Updates table for these versions?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29976</vuln:CVE>
    <vuln:CWE
      ID="CWE-269">Improper Privilege Management</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002722</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002692</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002722</vuln:URL>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002722</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002712</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002682</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002712</vuln:URL>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002712</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002708</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002691</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002708</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002708</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002706</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002680</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002706</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002706</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002709</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002705</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.18526.20286</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002709</vuln:URL>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002709</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Yansen with &lt;a href="https://www.pulsesecure.com/"&gt;PulseSecure Pte Ltd.&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="48">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29977</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002707</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002699</vuln:Supercedence>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002707</vuln:URL>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002707</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002717</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002704</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002717</vuln:URL>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002717</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>0x140ce</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="49">
    <vuln:Title>Microsoft PowerPoint Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office PowerPoint"
        Type="Tag"
        Ordinal="20">Microsoft Office PowerPoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29978</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/office365-proplus-security-updates</vuln:URL>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Haifei Li with &lt;a href="https://pub.expmon.com/"&gt;EXPMON&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="50">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29979</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002707</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002699</vuln:Supercedence>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002707</vuln:URL>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002707</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002717</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002704</vuln:Supercedence>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002717</vuln:URL>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002717</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>f4 &amp;amp; Zhiniang Peng with HUST</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="51">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30375</vuln:CVE>
    <vuln:CWE
      ID="CWE-843">Access of Resource Using Incompatible Type ('Type Confusion')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002707</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002699</vuln:Supercedence>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002707</vuln:URL>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002707</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002717</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002704</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002717</vuln:URL>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002717</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>0x140ce</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="52">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30376</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002707</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002699</vuln:Supercedence>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002707</vuln:URL>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002707</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002717</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002704</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002717</vuln:URL>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002717</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>wh1tc with Kunlun Lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>devoke with HUST</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Zhiniang Peng with HUST</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>cdbb6164ddfda2b210fd348442322115</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-05-30T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated acknowledgment. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="53">
    <vuln:Title>Microsoft Office Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, the Preview Pane is an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office"
        Type="Tag"
        Ordinal="20">Microsoft Office</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30377</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12155</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12155</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12155</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12155</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://play.google.com/store/apps/details?id=com.microsoft.office.officehubrow</vuln:URL>
        <vuln:ProductID>12155</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.18827.20000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.google.com/googleplay/answer/113412?hl=en</vuln:URL>
        <vuln:ProductID>12155</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002711</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002700</vuln:Supercedence>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1002</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002711</vuln:URL>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002711</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>0x140ce</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="54">
    <vuln:Title>Microsoft SharePoint Server Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30378</vuln:CVE>
    <vuln:CWE
      ID="CWE-502">Deserialization of Untrusted Data</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002722</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002692</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002722</vuln:URL>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002722</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002708</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002691</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002708</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002708</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002709</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002705</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.18526.20286</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002709</vuln:URL>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002709</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://github.com/zcgonvh"&gt;zcgonvh&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="55">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Release of invalid pointer or reference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30379</vuln:CVE>
    <vuln:CWE
      ID="CWE-763">Release of Invalid Pointer or Reference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002707</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002699</vuln:Supercedence>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002707</vuln:URL>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002707</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002717</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002704</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002717</vuln:URL>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002717</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002716</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002703</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002716</vuln:URL>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002716</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>0x140ce</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="56">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30381</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:CWE
      ID="CWE-822">Untrusted Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002707</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002699</vuln:Supercedence>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002707</vuln:URL>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002707</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002717</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002704</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002717</vuln:URL>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002717</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Zhiniang Peng with HUST</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>devoke with HUST</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>wh1tc with Kunlun Lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.1</cvrf:Number>
        <cvrf:Date>2025-05-28T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated acknowledgment. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="57">
    <vuln:Title>Microsoft SharePoint Server Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30382</vuln:CVE>
    <vuln:CWE
      ID="CWE-502">Deserialization of Untrusted Data</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002722</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002692</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002722</vuln:URL>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002722</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002708</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002691</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002708</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002708</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002709</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002705</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.18526.20286</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002709</vuln:URL>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002709</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://github.com/zcgonvh"&gt;zcgonvh&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="58">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploits this vulnerability could achieve remote code execution without user interaction.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30383</vuln:CVE>
    <vuln:CWE
      ID="CWE-843">Access of Resource Using Incompatible Type ('Type Confusion')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10836</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002707</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002699</vuln:Supercedence>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002707</vuln:URL>
        <vuln:ProductID>10836</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002707</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002717</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002704</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002717</vuln:URL>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002717</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>0x140ce</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="59">
    <vuln:Title>Microsoft SharePoint Server Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Deserialization of untrusted data in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office SharePoint"
        Type="Tag"
        Ordinal="20">Microsoft Office SharePoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30384</vuln:CVE>
    <vuln:CWE
      ID="CWE-502">Deserialization of Untrusted Data</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10950</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11585</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11961</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002722</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002692</vuln:Supercedence>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002722</vuln:URL>
        <vuln:ProductID>10950</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002722</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002708</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002691</vuln:Supercedence>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.10417.20010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002708</vuln:URL>
        <vuln:ProductID>11585</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002708</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002709</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002705</vuln:Supercedence>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.18526.20286</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002709</vuln:URL>
        <vuln:ProductID>11961</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002709</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://github.com/zcgonvh"&gt;zcgonvh&amp;#39;s cat Vanilla&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="61">
    <vuln:Title>Microsoft Office Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.&lt;/p&gt;
&lt;p&gt;Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of this vulnerability requires that an attacker send a malicious link to the victim via email, or that they convince the user to click the link, typically by way of an enticement in an email or Instant Messenger message. In the worst-case email attack scenario, an attacker could send a specially crafted email to the user without a requirement that the victim open, read, or click on the link. This could result in the attacker executing remote code on the victim's machine. When multiple attack vectors can be used, we assign a score based on the scenario with the higher risk (UI:N).&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes, the Preview Pane is an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office"
        Type="Tag"
        Ordinal="20">Microsoft Office</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30386</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12155</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12155</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12155</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12155</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10753</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10754</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://play.google.com/store/apps/details?id=com.microsoft.office.officehubrow</vuln:URL>
        <vuln:ProductID>12155</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.18827.20000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.google.com/googleplay/answer/113412?hl=en</vuln:URL>
        <vuln:ProductID>12155</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002711</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002700</vuln:Supercedence>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1002</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5002711</vuln:URL>
        <vuln:ProductID>10753</vuln:ProductID>
        <vuln:ProductID>10754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002711</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Li Shuang and willJ with Vulnerability Research Institute</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="62">
    <vuln:Title>Document Intelligence Studio On-Prem Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper limitation of a pathname to a restricted directory ('path traversal') in Azure allows an unauthorized attacker to elevate privileges over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What actions does a valid user have to take to be protected against this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Update the image to the latest tag. User data and setting will not be affected by upgrading to the latest tag.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could exploit this vulnerability by bypassing authentication/authorization to access files located one directory above the intended file upload path.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially download the content of parent folder of the mounted path.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure"
        Type="Tag"
        Ordinal="20">Azure</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30387</vuln:CVE>
    <vuln:CWE
      ID="CWE-22">Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16741</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16741</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16741</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.8</vuln:BaseScore>
        <vuln:TemporalScore>8.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16741</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://mcr.microsoft.com/en-us/artifact/mar/azure-cognitive-services/form-recognizer/studio/tags</vuln:URL>
        <vuln:ProductID>16741</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.0.03019.1-official-7241c17a</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/azure/ai-services/document-intelligence/whats-new?view=doc-intel-4.0.0</vuln:URL>
        <vuln:ProductID>16741</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/yanir_"&gt;Yanir Tsarimi&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="7">
    <vuln:Title>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper privilege management in Windows Secure Kernel Mode allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Secure Kernel Mode"
        Type="Tag"
        Ordinal="20">Windows Secure Kernel Mode</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-27468</vuln:CVE>
    <vuln:CWE
      ID="CWE-269">Improper Privilege Management</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Naceri with MSRC Vulnerabilities &amp;amp; Mitigations</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="64">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30393</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/office365-proplus-security-updates</vuln:URL>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Li Shuang and willJ with Vulnerability Research Institute</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="11">
    <vuln:Title>Microsoft Dataverse Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper handling of insufficient permissions or privileges in Microsoft Dataverse allows an authorized attacker to elevate privileges over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What actions do I need to take to be protected from this vulnerability&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Customers who do not wish to wait for the PDU can update Dataverse by doing the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Open &lt;strong&gt;Resource Scheduling Optimization&lt;/strong&gt; and select &lt;strong&gt;Upgrade to new version&lt;/strong&gt;.&lt;/li&gt;
&lt;li&gt;Select version 1406 from the &lt;strong&gt;Select target version&lt;/strong&gt; list.&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Dataverse"
        Type="Tag"
        Ordinal="20">Microsoft Dataverse</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29826</vuln:CVE>
    <vuln:CWE
      ID="CWE-280">Improper Handling of Insufficient Permissions or Privileges</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12338</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12338</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12338</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.3</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12338</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/dynamics365/released-versions/Microsoft-Dataverse</vuln:URL>
        <vuln:ProductID>12338</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>3.4.0.1406</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/dynamics365/field-service/field-service-version-history-resource-scheduling-optimization#3401406</vuln:URL>
        <vuln:ProductID>12338</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Prasanna Kudli</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="65">
    <vuln:Title>Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Sensitive data storage in improperly locked memory in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Remote Desktop Gateway Service"
        Type="Tag"
        Ordinal="20">Remote Desktop Gateway Service</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30394</vuln:CVE>
    <vuln:CWE
      ID="CWE-591">Sensitive Data Storage in Improperly Locked Memory</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>bee13oy with &lt;a href="https://www.cyberkl.com/"&gt;Cyber Kunlun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>ʌ!ɔ⊥ojv with Kunlun Lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>SmallerDragon</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous working with Trend Zero Day Initiative</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-06-03T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated acknowledgment. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="67">
    <vuln:Title>Microsoft DWM Core Library Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows DWM"
        Type="Tag"
        Ordinal="20">Windows DWM</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30400</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Threat Intelligence Center</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="68">
    <vuln:Title>Windows Common Log File System Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Common Log File System Driver"
        Type="Tag"
        Ordinal="20">Windows Common Log File System Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-32701</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Threat Intelligence Center</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="70">
    <vuln:Title>Visual Studio Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Insufficient granularity of access control in Visual Studio allows an authorized attacker to disclose information locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability could allow the disclosure of certain memory address within kernel space. Knowing the exact location of kernel memory could be potentially leveraged by an attacker for other malicious activities.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Visual Studio"
        Type="Tag"
        Ordinal="20">Visual Studio</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-32703</vuln:CVE>
    <vuln:CWE
      ID="CWE-1220">Insufficient Granularity of Access Control</vuln:CWE>
    <vuln:CWE
      ID="CWE-200">Exposure of Sensitive Information to an Unauthorized Actor</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11600</vuln:ProductID>
        <vuln:ProductID>11935</vuln:ProductID>
        <vuln:ProductID>12459</vuln:ProductID>
        <vuln:ProductID>12506</vuln:ProductID>
        <vuln:ProductID>12271</vuln:ProductID>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11600</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11935</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12459</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12506</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12271</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11600</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11935</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12459</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12506</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12271</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11600</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11935</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12459</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12506</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12271</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>http://aka.ms/vs/15/release/latest</vuln:URL>
        <vuln:ProductID>11600</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>15.9.73</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/visualstudio/releasenotes/vs2017-relnotes</vuln:URL>
        <vuln:ProductID>11600</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.11</vuln:URL>
        <vuln:ProductID>11935</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.11.47</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.11</vuln:URL>
        <vuln:ProductID>11935</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.12</vuln:URL>
        <vuln:ProductID>12459</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.12.8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12459</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.13</vuln:URL>
        <vuln:ProductID>12506</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.13.7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12506</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.8</vuln:URL>
        <vuln:ProductID>12271</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.8.21</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12271</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.10</vuln:URL>
        <vuln:ProductID>12322</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.10.14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12322</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="73">
    <vuln:Title>Windows Common Log File System Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper input validation in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Common Log File System Driver"
        Type="Tag"
        Ordinal="20">Windows Common Log File System Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-32706</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>7.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>CrowdStrike Advanced Research Team</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Benoit Sevens of Google Threat Intelligence Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="1">
    <vuln:Title>Visual Studio Code Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Files or directories accessible to external parties in Visual Studio Code allows an unauthorized attacker to bypass a security feature locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), and some loss of integrity (I:L), but no loss of availability (A:N). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could view sensitive information, a token in this scenario (Confidentiality), and make some changes to disclosed information (Integrity), but they would not be able to affect Availability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What kind of security feature could be bypassed by successfully exploiting this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could bypass the Trusted Domain Service.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Visual Studio Code"
        Type="Tag"
        Ordinal="20">Visual Studio Code</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-21264</vuln:CVE>
    <vuln:CWE
      ID="CWE-552">Files or Directories Accessible to External Parties</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11622</vuln:ProductID>
        <vuln:ProductID>16782</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>16782</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16782</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11622</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.1</vuln:BaseScore>
        <vuln:TemporalScore>6.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16782</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://code.visualstudio.com/download</vuln:URL>
        <vuln:ProductID>11622</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>1.100.1</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://code.visualstudio.com/updates/v1_100</vuln:URL>
        <vuln:ProductID>11622</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://code.visualstudio.com/Download</vuln:URL>
        <vuln:ProductID>16782</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>0.27.2</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://github.com/microsoft/vscode/</vuln:URL>
        <vuln:ProductID>16782</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-06-17T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;In the Security Updates Table, added Microsoft Visual Studio CoPilot Chat Extension as it is also affected by this vulnerability. Microsoft recommends that customers install the update to be fully protected from the vulnerability.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="76">
    <vuln:Title>Microsoft msagsfeedback.azurewebsites.net Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper access control in Azure allows an unauthorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.&lt;/p&gt;
&lt;p&gt;Please see &lt;a href="https://aka.ms/MSRC-Cloud-CVEs"&gt;Toward greater transparency: Unveiling Cloud Service CVEs&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure"
        Type="Tag"
        Ordinal="20">Azure</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">No</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-33072</vuln:CVE>
    <vuln:CWE
      ID="CWE-284">Improper Access Control</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16744</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>16744</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>16744</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.1</vuln:BaseScore>
        <vuln:TemporalScore>7.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16744</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://www.linkedin.com/in/a-zaiter/"&gt;Abdulrahman Zaiter&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-08T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="75">
    <vuln:Title>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain administrator privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;I am running Windows Server 2008 or Windows Server 2008 R2. How do I protect my system from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The protections for this vulnerability are not included in the following May 2025 monthly rollup or security-only updates released on May 13, 2025:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows Server 2008 R2: KB5058454 (Security-only update)&lt;/li&gt;
&lt;li&gt;Windows Server 2008 R2: KB5058430 (Monthly Rollup)&lt;/li&gt;
&lt;li&gt;Windows Server 2008: KB5058429 (Security-only update)&lt;/li&gt;
&lt;li&gt;Windows Server 2008: KB5058449 (Monthly Rollup)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Instead, customers running these versions of Windows Server need to install the following Out-of-Band (OOB) updates, released also on May 13, 2025, as applicable:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows Server 2008 R2: KB5061195 (Security-only update)&lt;/li&gt;
&lt;li&gt;Windows Server 2008 R2: KB5061196 (Monthly Rollup)&lt;/li&gt;
&lt;li&gt;Windows Server 2008: KB5061197 (Security-only update)&lt;/li&gt;
&lt;li&gt;Windows Server 2008: KB5061198 (Monthly Rollup)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Note&lt;/strong&gt; These OOB updates are cumulative, so if you haven't already installed the May 2025 monthly rollup or security-only updates, you can install the applicable OOB update directly. If you have already installed the May 2025 monthly rollup or security-only updates, you need to also install the OOB updates to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Ancillary Function Driver for WinSock"
        Type="Tag"
        Ordinal="20">Windows Ancillary Function Driver for WinSock</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-32709</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5061198</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5061198</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23317</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5061198</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5061198</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5061197</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5061197</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23317</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5061197</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5061197</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5061196</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5061196</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27730</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5061196</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5061196</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5061195</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5061195</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27730</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5061195</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-15T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;In the Security Updates table, added all supported editions of Windows Server 2008 and Windows Server 2008 R2 as they are affected by this vulnerability. Customers running these versions of Windows Server please note that to be protected from this vulnerability you need to install the out-of-band updates as follows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Windows Server 2008 R2: KB5061195 (Security-only update)&lt;/li&gt;
&lt;li&gt;Windows Server 2008 R2: KB5061196 (Monthly Rollup)&lt;/li&gt;
&lt;li&gt;Windows Server 2008: KB5061197 (Security-only update)&lt;/li&gt;
&lt;li&gt;Windows Server 2008: KB5061198 (Monthly Rollup)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Please see the Security Updates table and FAQs section for more information.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="91">
    <vuln:Title>Chromium: CVE-2025-5066 Inappropriate implementation in Messages</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%5BSS9.1%5D5"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;137.0.3296.52&lt;/td&gt;
&lt;td&gt;5/29/2025&lt;/td&gt;
&lt;td&gt;137.0.7151.55/.56&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5066</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>137.0.3296.52</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-29T19:06:23</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="92">
    <vuln:Title>Chromium: CVE-2025-5067 Inappropriate implementation in Tab Strip</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%5BSS9.1%5D5"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;137.0.3296.52&lt;/td&gt;
&lt;td&gt;5/29/2025&lt;/td&gt;
&lt;td&gt;137.0.7151.55/.56&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5067</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>137.0.3296.52</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-29T18:55:16</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="95">
    <vuln:Title>Chromium: CVE-2025-5283 Use after free in libvpx</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%5BSS9.1%5D5"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;137.0.3296.52&lt;/td&gt;
&lt;td&gt;5/29/2025&lt;/td&gt;
&lt;td&gt;137.0.7151.55/.56&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5283</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>137.0.3296.52</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-29T18:55:14</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="94">
    <vuln:Title>Chromium: CVE-2025-5281 Inappropriate implementation in BFCache</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%5BSS9.1%5D5"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;137.0.3296.52&lt;/td&gt;
&lt;td&gt;5/29/2025&lt;/td&gt;
&lt;td&gt;137.0.7151.55/.56&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5281</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>137.0.3296.52</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-29T18:55:12</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="90">
    <vuln:Title>Chromium: CVE-2025-5065 Inappropriate implementation in FileSystemAccess API</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%5BSS9.1%5D5"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;137.0.3296.52&lt;/td&gt;
&lt;td&gt;5/29/2025&lt;/td&gt;
&lt;td&gt;137.0.7151.55/.56&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5065</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>137.0.3296.52</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-29T18:55:09</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="89">
    <vuln:Title>Chromium: CVE-2025-5064 Inappropriate implementation in Background Fetch API</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%5BSS9.1%5D5"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;137.0.3296.52&lt;/td&gt;
&lt;td&gt;5/29/2025&lt;/td&gt;
&lt;td&gt;137.0.7151.55/.56&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5064</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>137.0.3296.52</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-29T18:55:07</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="93">
    <vuln:Title>Chromium: CVE-2025-5280 Out of bounds write in V8</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%5BSS9.1%5D5"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;137.0.3296.52&lt;/td&gt;
&lt;td&gt;5/29/2025&lt;/td&gt;
&lt;td&gt;137.0.7151.55/.56&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5280</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>137.0.3296.52</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-29T18:55:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="88">
    <vuln:Title>Chromium: CVE-2025-5063 Use after free in Compositing</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%5BSS9.1%5D5"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;137.0.3296.52&lt;/td&gt;
&lt;td&gt;5/29/2025&lt;/td&gt;
&lt;td&gt;137.0.7151.55/.56&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-5063</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>137.0.3296.52</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-29T18:55:01</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="4">
    <vuln:Title>Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Uncontrolled resource consumption in Remote Desktop Gateway Service allows an unauthorized attacker to deny service over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Remote Desktop Gateway Service"
        Type="Tag"
        Ordinal="20">Remote Desktop Gateway Service</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-26677</vuln:CVE>
    <vuln:CWE
      ID="CWE-400">Uncontrolled Resource Consumption</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>ʌ!ɔ⊥ojv with Kunlun Lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/keyz3r0"&gt;k0shl&lt;/a&gt; with &lt;a href="https://www.cyberkl.com/"&gt;Kunlun Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="8">
    <vuln:Title>Microsoft Windows Hardware Lab Kit (HLK) Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use of hard-coded credentials in Windows Hardware Lab Kit allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Hardware Lab Kit"
        Type="Tag"
        Ordinal="20">Windows Hardware Lab Kit</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-27488</vuln:CVE>
    <vuln:CWE
      ID="CWE-798">Use of Hard-coded Credentials</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16752</vuln:ProductID>
        <vuln:ProductID>16753</vuln:ProductID>
        <vuln:ProductID>16756</vuln:ProductID>
        <vuln:ProductID>16759</vuln:ProductID>
        <vuln:ProductID>16751</vuln:ProductID>
        <vuln:ProductID>16754</vuln:ProductID>
        <vuln:ProductID>16760</vuln:ProductID>
        <vuln:ProductID>16757</vuln:ProductID>
        <vuln:ProductID>16758</vuln:ProductID>
        <vuln:ProductID>16761</vuln:ProductID>
        <vuln:ProductID>16755</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16752</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16756</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16759</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16751</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16760</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16757</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16758</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16761</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>16755</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16752</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16753</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16756</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16759</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16751</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16754</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16760</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16757</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16758</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16761</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>16755</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16752</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16753</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16756</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16759</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16751</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16754</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16760</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16757</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16758</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16761</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.7</vuln:BaseScore>
        <vuln:TemporalScore>5.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16755</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/?linkid=2320012</vuln:URL>
        <vuln:ProductID>16752</vuln:ProductID>
        <vuln:ProductID>16753</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.1.26100.3478</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/windows-hardware/test/hlk/what-s-new-in-the-hardware-lab-kit#whats-new-in-previous-releases</vuln:URL>
        <vuln:ProductID>16752</vuln:ProductID>
        <vuln:ProductID>16753</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/?linkid=2319329</vuln:URL>
        <vuln:ProductID>16756</vuln:ProductID>
        <vuln:ProductID>16755</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.1.17763.7010</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/windows-hardware/test/hlk/what-s-new-in-the-hardware-lab-kit#whats-new-in-previous-releases</vuln:URL>
        <vuln:ProductID>16756</vuln:ProductID>
        <vuln:ProductID>16755</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/?linkid=2320002</vuln:URL>
        <vuln:ProductID>16759</vuln:ProductID>
        <vuln:ProductID>16760</vuln:ProductID>
        <vuln:ProductID>16757</vuln:ProductID>
        <vuln:ProductID>16758</vuln:ProductID>
        <vuln:ProductID>16761</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.1.19041.5609</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/windows-hardware/test/hlk/what-s-new-in-the-hardware-lab-kit#whats-new-in-previous-releases</vuln:URL>
        <vuln:ProductID>16759</vuln:ProductID>
        <vuln:ProductID>16760</vuln:ProductID>
        <vuln:ProductID>16757</vuln:ProductID>
        <vuln:ProductID>16758</vuln:ProductID>
        <vuln:ProductID>16761</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/?linkid=2320114</vuln:URL>
        <vuln:ProductID>16751</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.1.22621.5040</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/windows-hardware/test/hlk/what-s-new-in-the-hardware-lab-kit#whats-new-in-previous-releases</vuln:URL>
        <vuln:ProductID>16751</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/?linkid=2320003</vuln:URL>
        <vuln:ProductID>16754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.1.20348.3330</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/windows-hardware/test/hlk/what-s-new-in-the-hardware-lab-kit#whats-new-in-previous-releases</vuln:URL>
        <vuln:ProductID>16754</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="6">
    <vuln:Title>Microsoft Defender for Identity Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper authentication in Microsoft Defender for Identity allows an unauthorized attacker to perform spoofing over an adjacent network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What actions do I need to take to be protected from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No admin action is required. Customers that have NTLM completely disabled in their environment and would like to keep the feature working, should open a support case requesting to reenable the feature. For more information, please see this article: &lt;a href="https://learn.microsoft.com/en-us/defender-for-identity/deploy/remote-calls-sam"&gt;https://learn.microsoft.com/en-us/defender-for-identity/deploy/remote-calls-sam&lt;/a&gt;&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthenticated attacker with LAN access could exploit this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Defender for Identity"
        Type="Tag"
        Ordinal="20">Microsoft Defender for Identity</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-26685</vuln:CVE>
    <vuln:CWE
      ID="CWE-287">Improper Authentication</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12512</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>12512</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12512</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12512</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://linkedin.com/in/joshua-murrell-io"&gt;Joshua Murrell&lt;/a&gt; with &lt;a href="https://www.netspi.com/"&gt;NetSPI&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="13">
    <vuln:Title>Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability could allow the disclosure of certain kernel memory content.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Trusted Runtime Interface Driver"
        Type="Tag"
        Ordinal="20">Windows Trusted Runtime Interface Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29829</vuln:CVE>
    <vuln:CWE
      ID="CWE-908">Use of Uninitialized Resource</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/scwuaptx"&gt;Angelboy (@scwuaptx)&lt;/a&gt; with &lt;a href="https://devco.re/"&gt;DEVCORE&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="14">
    <vuln:Title>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In a web-based attack scenario, an attacker could host a website or server that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Routing and Remote Access Service (RRAS)"
        Type="Tag"
        Ordinal="20">Windows Routing and Remote Access Service (RRAS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29830</vuln:CVE>
    <vuln:CWE
      ID="CWE-908">Use of Uninitialized Resource</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="15">
    <vuln:Title>Windows Remote Desktop Services Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Remote Desktop Gateway Service allows an unauthorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker could successfully exploit this vulnerability by attempting to connect to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires an admin user to stop or restart the service.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Remote Desktop Gateway Service"
        Type="Tag"
        Ordinal="20">Remote Desktop Gateway Service</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29831</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>ʌ!ɔ⊥ojv with Kunlun Lab</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="16">
    <vuln:Title>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Routing and Remote Access Service (RRAS)"
        Type="Tag"
        Ordinal="20">Windows Routing and Remote Access Service (RRAS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29832</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="17">
    <vuln:Title>Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Time-of-check time-of-use (toctou) race condition in Windows Virtual Machine Bus allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An authorized attacker with privileges could send controlled inputs to exploit this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability could allow a Hyper-V guest to affect the functionality of the Hyper-V host.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Virtual Machine Bus"
        Type="Tag"
        Ordinal="20">Windows Virtual Machine Bus</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29833</vuln:CVE>
    <vuln:CWE
      ID="CWE-367">Time-of-check Time-of-use (TOCTOU) Race Condition</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.7</vuln:BaseScore>
        <vuln:TemporalScore>6.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Chief Banana</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added an FAQ and updated the CVSS score. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="18">
    <vuln:Title>Windows Remote Access Connection Manager Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack requires an admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Routing and Remote Access Service (RRAS)"
        Type="Tag"
        Ordinal="20">Windows Routing and Remote Access Service (RRAS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29835</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="19">
    <vuln:Title>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthorized attacker must wait for a user to initiate a connection.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Routing and Remote Access Service (RRAS)"
        Type="Tag"
        Ordinal="20">Windows Routing and Remote Access Service (RRAS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29836</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Offensive Research &amp;amp; Security Engineering</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="20">
    <vuln:Title>Windows Installer Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper link resolution before file access ('link following') in Windows Installer allows an authorized attacker to disclose information locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The type of information that could be disclosed if an attacker successfully exploited this vulnerability is the contents of Kernel memory. An attacker could read the contents of Kernel memory from a user mode process.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Installer"
        Type="Tag"
        Ordinal="20">Windows Installer</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29837</vuln:CVE>
    <vuln:CWE
      ID="CWE-59">Improper Link Resolution Before File Access ('Link Following')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.5</vuln:BaseScore>
        <vuln:TemporalScore>4.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Simon Zuckerbraun of Trend Zero Day Initiative</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="21">
    <vuln:Title>Windows ExecutionContext Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Null pointer dereference in Windows Drivers allows an unauthorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires a mappable null page.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Drivers"
        Type="Tag"
        Ordinal="20">Windows Drivers</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29838</vuln:CVE>
    <vuln:CWE
      ID="CWE-476">NULL Pointer Dereference</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.4</vuln:BaseScore>
        <vuln:TemporalScore>6.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://linkedin.com/in/jongseongkim"&gt;Jongseong Kim (nevul37)&lt;/a&gt; with &lt;a href="https://www.enki.co.kr/"&gt;Ajou University, and working at ENKI WhiteHat&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://linkedin.com/in/kdj-abysslab"&gt;Dongjun Kim (smlijun)&lt;/a&gt; with &lt;a href="https://www.enki.co.kr/"&gt;Ajou University, and working at ENKI WhiteHat&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="22">
    <vuln:Title>Windows Multiple UNC Provider Driver Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Windows File Server allows an unauthorized attacker to disclose information locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metrics, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L),but lead to no loss of availability (A:N) and integrity (I:N)? What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited the vulnerability could view some sensitive information (Confidentiality) but not all resources within the impacted component may be divulged to the attacker. The attacker cannot make changes to disclosed information (Integrity) or limit access to the resource (Availability).&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows File Server"
        Type="Tag"
        Ordinal="20">Windows File Server</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29839</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>4.0</vuln:BaseScore>
        <vuln:TemporalScore>3.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/scwuaptx"&gt;Angelboy (@scwuaptx)&lt;/a&gt; with &lt;a href="https://devco.re/"&gt;DEVCORE&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="23">
    <vuln:Title>Windows Media Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Stack-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack requires a user to open a specially crafted file from the attacker to initiate remote code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Media"
        Type="Tag"
        Ordinal="20">Windows Media</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29840</vuln:CVE>
    <vuln:CWE
      ID="CWE-121">Stack-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Dan Mattson with Microsoft</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="24">
    <vuln:Title>Universal Print Management Service Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Concurrent execution using shared resource with improper synchronization ('race condition') in Universal Print Management Service allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to win a race condition.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Universal Print Management Service"
        Type="Tag"
        Ordinal="20">Universal Print Management Service</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29841</vuln:CVE>
    <vuln:CWE
      ID="CWE-362">Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')</vuln:CWE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.0</vuln:BaseScore>
        <vuln:TemporalScore>6.1</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://x.com/ro_ll_ing"&gt;Byunghyun Kang&lt;/a&gt; with &lt;a href="https://home.sejong.ac.kr/~cedpt/"&gt;Sejong University&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="25">
    <vuln:Title>UrlMon Security Feature Bypass Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Acceptance of extraneous untrusted data with trusted data in UrlMon allows an unauthorized attacker to bypass a security feature over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The user would have to click on a specially crafted URL to be compromised by the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What kind of security feature could be bypassed by successfully exploiting this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability would allow an attacker to bypass the Office Protected View and open in editing mode rather than protected mode.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires that a user open a specially crafted Word file.&lt;/p&gt;
&lt;p&gt;In an email attack scenario, an attacker could exploit the vulnerability by sending a link to the specially crafted Word file. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to open the file, typically by way of an enticement in an email or instant message.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="UrlMon"
        Type="Tag"
        Ordinal="20">UrlMon</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29842</vuln:CVE>
    <vuln:CWE
      ID="CWE-349">Acceptance of Extraneous Untrusted Data With Trusted Data</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Security Feature Bypass</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>6.5</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Felix Boulet</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="26">
    <vuln:Title>Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Uncontrolled resource consumption in Windows LDAP - Lightweight Directory Access Protocol allows an unauthorized attacker to deny service over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to invest time in repeated exploitation attempts through sending constant or intermittent data.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are there additional actions I need to take to harden my system against unauthenticated RPC calls?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Possibly. Refer to &lt;a href="https://support.microsoft.com/en-us/topic/kb5066014-netlogon-rpc-hardening-cve-2025-49716-38a0bc06-507c-47d4-be0f-ca1acab02c68"&gt;KB5066014—Netlogon RPC Hardening (CVE-2025-49716) - Microsoft Support&lt;/a&gt; for additional follow-up actions you might need to take.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows LDAP - Lightweight Directory Access Protocol"
        Type="Tag"
        Ordinal="20">Windows LDAP - Lightweight Directory Access Protocol</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29954</vuln:CVE>
    <vuln:CWE
      ID="CWE-400">Uncontrolled Resource Consumption</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.9</vuln:BaseScore>
        <vuln:TemporalScore>5.2</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Dan Reynolds</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://bsky.app/profile/hexnomad.bsky.social"&gt;Erik Egsgard&lt;/a&gt; with &lt;a href="https://fieldeffect.com/"&gt;Field Effect&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-08-07T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added an acknowledgement. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.2</cvrf:Number>
        <cvrf:Date>2025-09-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Added an FAQ to provide a link to &lt;a href="https://support.microsoft.com/en-us/topic/kb5066014-netlogon-rpc-hardening-cve-2025-49716-38a0bc06-507c-47d4-be0f-ca1acab02c68"&gt;KB5066014—Netlogon RPC Hardening (CVE-2025-49716) - Microsoft Support&lt;/a&gt;. The article provides further guidance for hardening systems against unauthenticated RPC calls. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="27">
    <vuln:Title>Windows Hyper-V Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper input validation in Windows Hyper-V allows an unauthorized attacker to deny service locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Role: Windows Hyper-V"
        Type="Tag"
        Ordinal="20">Role: Windows Hyper-V</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29955</vuln:CVE>
    <vuln:CWE
      ID="CWE-20">Improper Input Validation</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>MORSE with &lt;a href="https://microsoft.com/"&gt;Microsoft&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="28">
    <vuln:Title>Windows SMB Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Buffer over-read in Windows SMB allows an authorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R) and privileges required is low (PR:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attack requires to trick a user to open an SMB share folder that is hosted on the attacker-controlled system. Windows Explorer has to automatically register for directory change notification after opening the share folder.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;To successfully exploit the vulnerability, an attacker would need to direct a user to connect to the malicious SMB server to retrieve some data as part of an OS API call.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For this vulnerability, it is out of attacker's control to trigger the OOB read buffer to be sent back to the attacker-controlled system.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H), no loss of integrity (I:N), and some loss of availability (A:L). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is a high likelihood that the Out-Of-Bounds (OOB) read data results in a crash in Windows Explorer. Every time the SMB client sends the OOB read data to the remote SMB server and a crash does not occur, it would contain several bytes of random user mode heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows SMB"
        Type="Tag"
        Ordinal="20">Windows SMB</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29956</vuln:CVE>
    <vuln:CWE
      ID="CWE-126">Buffer Over-read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.4</vuln:BaseScore>
        <vuln:TemporalScore>4.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:L/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Genghis Karimov with Microsoft High Availability Storage Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="29">
    <vuln:Title>Windows Deployment Services Denial of Service Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Uncontrolled resource consumption in Windows Deployment Services allows an unauthorized attacker to deny service locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Deployment Services"
        Type="Tag"
        Ordinal="20">Windows Deployment Services</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29957</vuln:CVE>
    <vuln:CWE
      ID="CWE-400">Uncontrolled Resource Consumption</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Denial of Service</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.2</vuln:BaseScore>
        <vuln:TemporalScore>5.4</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>R4nger &amp;amp; Zhiniang Peng</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="30">
    <vuln:Title>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In a web-based attack scenario, an attacker could host a website or server that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Routing and Remote Access Service (RRAS)"
        Type="Tag"
        Ordinal="20">Windows Routing and Remote Access Service (RRAS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29958</vuln:CVE>
    <vuln:CWE
      ID="CWE-908">Use of Uninitialized Resource</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="33">
    <vuln:Title>Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to disclose information over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In a web-based attack scenario, an attacker could host a website or server that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially read small portions of heap memory.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Routing and Remote Access Service (RRAS)"
        Type="Tag"
        Ordinal="20">Windows Routing and Remote Access Service (RRAS)</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29961</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>6.5</vuln:BaseScore>
        <vuln:TemporalScore>5.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous with Codesafe Team of Legendsec at QI-ANXIN Group</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="34">
    <vuln:Title>Windows Media Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack requires a user to open a specially crafted file from the attacker to initiate remote code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Media"
        Type="Tag"
        Ordinal="20">Windows Media</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29962</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="35">
    <vuln:Title>Windows Media Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is network (AV:N) and user interaction is required (UI:R). What is the target context of the remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack requires a user to open a specially crafted file from the attacker to initiate remote code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How could an attacker exploit this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Media"
        Type="Tag"
        Ordinal="20">Windows Media</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29963</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.8</vuln:BaseScore>
        <vuln:TemporalScore>7.7</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="45">
    <vuln:Title>Windows Kernel Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Integer underflow (wrap or wraparound) in Windows Kernel allows an unauthorized attacker to disclose information over an adjacent network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What type of information could be disclosed by this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability could allow the disclosure of certain kernel memory content.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker must send a user a malicious Office file and convince them to open it.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is adjacent (AV:A). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploiting this vulnerability requires an attacker to be within proximity of the target system to send and receive radio transmissions.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Kernel"
        Type="Tag"
        Ordinal="20">Windows Kernel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29974</vuln:CVE>
    <vuln:CWE
      ID="CWE-191">Integer Underflow (Wrap or Wraparound)</vuln:CWE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>5.7</vuln:BaseScore>
        <vuln:TemporalScore>5.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Anonymous</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="60">
    <vuln:Title>Windows Common Log File System Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited the vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could potentially gain the ability to crash the system by exploiting the use-after-free vulnerability, even as a standard user.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Common Log File System Driver"
        Type="Tag"
        Ordinal="20">Windows Common Log File System Driver</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30385</vuln:CVE>
    <vuln:CWE
      ID="CWE-416">Use After Free</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/ecthr0s"&gt;George Hughey&lt;/a&gt; with MSRC Vulnerabilities &amp;amp; Mitigations</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://linkedin.com/in/dr-sr"&gt;Dan Reynolds&lt;/a&gt; with MSRC Vulnerabilities &amp;amp; Mitigations</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="63">
    <vuln:Title>Windows Graphics Component Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Heap-based buffer overflow in Windows Win32K - GRFX allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Are the updates for Microsoft Office LTSC for Mac 2021 and 2024 currently available?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Yes. As of May 14, 2025, the security update for Microsoft Office LTSC for Mac 2021 and 2024 are available. Customers running Microsoft Office LTSC for Mac 2021 and 2024 should ensure the update is installed to be protected from this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Win32K - GRFX"
        Type="Tag"
        Ordinal="20">Windows Win32K - GRFX</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30388</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12155</vuln:ProductID>
        <vuln:ProductID>12156</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12155</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12156</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12155</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12156</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11951</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12155</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12156</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12440</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.97.25042725</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://go.microsoft.com/fwlink/p/?linkid=831049</vuln:URL>
        <vuln:ProductID>11951</vuln:ProductID>
        <vuln:ProductID>12440</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://play.google.com/store/apps/details?id=com.microsoft.office.officehubrow</vuln:URL>
        <vuln:ProductID>12155</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.18827.20000</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.google.com/googleplay/answer/113412?hl=en</vuln:URL>
        <vuln:ProductID>12155</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f</vuln:URL>
        <vuln:ProductID>12156</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.14326.22502</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f</vuln:URL>
        <vuln:ProductID>12156</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://x.com/gaborseljan"&gt;G&amp;#225;bor Selj&amp;#225;n&lt;/a&gt; with &lt;a href="https://checkpoint.com/"&gt;Check Point&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>2.0</cvrf:Number>
        <cvrf:Date>2025-05-14T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Microsoft is announcing the availability of the security updates for Microsoft Office for Mac. Customers running affected Mac software should install the update for their product to be protected from this vulnerability. Customers running other Microsoft Office software do not need to take any action. See the &lt;a href="https://go.microsoft.com/fwlink/p/?linkid=831049"&gt;Release Notes&lt;/a&gt; for more information and download links.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="66">
    <vuln:Title>Scripting Engine Memory Corruption Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Access of resource using incompatible type ('type confusion') in Microsoft Scripting Engine allows an unauthorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Successful exploitation of this vulnerability requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This attack requires an authenticated client to click a link so that an unauthenticated attacker can initiate remote code execution.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The user would have to click on a specially crafted URL to be compromised by the attacker.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;The Security Updates table indicates that this vulnerability affects all supported versions of Microsoft Windows. Why are IE Cumulative updates listed for Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;While Microsoft has announced retirement of the Internet Explorer 11 application on certain platforms and the Microsoft Edge Legacy application is deprecated, the underlying MSHTML, EdgeHTML, and scripting platforms are still supported. The MSHTML platform is used by Internet Explorer mode in Microsoft Edge as well as other applications through WebBrowser control. The EdgeHTML platform is used by WebView and some UWP applications. The scripting platforms are used by MSHTML and EdgeHTML but can also be used by other legacy applications. Updates to address vulnerabilities in the MSHTML platform and scripting engine are included in the IE Cumulative Updates; EdgeHTML and Chakra changes are not applicable to those platforms.&lt;/p&gt;
&lt;p&gt;To stay fully protected, we recommend that customers who install Security Only updates install the IE Cumulative updates for this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Scripting Engine"
        Type="Tag"
        Ordinal="20">Microsoft Scripting Engine</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-30397</vuln:CVE>
    <vuln:CWE
      ID="CWE-843">Access of Resource Using Incompatible Type ('Type Confusion')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:Yes;Latest Software Release:Exploitation Detected</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.5</vuln:BaseScore>
        <vuln:TemporalScore>7.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058380</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058380</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>IE Cumulative</vuln:SubType>
        <vuln:FixedBuild>1.003</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/en-us/help/5058380</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058380</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Microsoft Threat Intelligence Center</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="69">
    <vuln:Title>Visual Studio Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper neutralization of special elements used in a command ('command injection') in Visual Studio allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.&lt;/p&gt;
&lt;p&gt;For example, when the score indicates that the &lt;strong&gt;Attack Vector&lt;/strong&gt; is &lt;strong&gt;Local&lt;/strong&gt; and &lt;strong&gt;User Interaction&lt;/strong&gt; is &lt;strong&gt;Required&lt;/strong&gt;, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Visual Studio"
        Type="Tag"
        Ordinal="20">Visual Studio</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-32702</vuln:CVE>
    <vuln:CWE
      ID="CWE-77">Improper Neutralization of Special Elements used in a Command ('Command Injection')</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11935</vuln:ProductID>
        <vuln:ProductID>12459</vuln:ProductID>
        <vuln:ProductID>12506</vuln:ProductID>
        <vuln:ProductID>12271</vuln:ProductID>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11935</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12459</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12506</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12271</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11935</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12459</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12506</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12271</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:Yes;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11935</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12459</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12506</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12271</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12322</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2019 version 16.11</vuln:URL>
        <vuln:ProductID>11935</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.11.47</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.11</vuln:URL>
        <vuln:ProductID>11935</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.12</vuln:URL>
        <vuln:ProductID>12459</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.12.8</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12459</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.13</vuln:URL>
        <vuln:ProductID>12506</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.13.7</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12506</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.8</vuln:URL>
        <vuln:ProductID>12271</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.8.21</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12271</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://my.visualstudio.com/Downloads?q=Visual Studio 2022 version 17.10</vuln:URL>
        <vuln:ProductID>12322</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>17.10.14</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/visualstudio/releases/2022/release-notes</vuln:URL>
        <vuln:ProductID>12322</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name />
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="71">
    <vuln:Title>Microsoft Excel Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Excel"
        Type="Tag"
        Ordinal="20">Microsoft Office Excel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-32704</vuln:CVE>
    <vuln:CWE
      ID="CWE-126">Buffer Over-read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11573</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11574</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10739</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.4</vuln:BaseScore>
        <vuln:TemporalScore>7.3</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10740</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/microsoft365-apps-security-updates</vuln:URL>
        <vuln:ProductID>11573</vuln:ProductID>
        <vuln:ProductID>11574</vuln:ProductID>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5002695</vuln:Description>
        <vuln:URL />
        <vuln:Supercedence>5002179</vuln:Supercedence>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Maybe</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>16.0.5500.1001</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/kb/5002695</vuln:URL>
        <vuln:ProductID>10739</vuln:ProductID>
        <vuln:ProductID>10740</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5002695</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>f4</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/jq0904"&gt;Quan Jin&lt;/a&gt; with &lt;a href="https://www.dbappsecurity.com.cn/product/cloud250.html"&gt;DBAPPSecurity WeBin Lab&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="72">
    <vuln:Title>Microsoft Outlook Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Microsoft Office Outlook allows an unauthorized attacker to execute code locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The word &lt;strong&gt;Remote&lt;/strong&gt; in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Is the Preview Pane an attack vector for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;No, the Preview Pane is not an attack vector.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Outlook software.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.&lt;/li&gt;
&lt;/ul&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Office Outlook"
        Type="Tag"
        Ordinal="20">Microsoft Office Outlook</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-32705</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11762</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11763</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11952</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11953</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12420</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12421</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Click to Run</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>https://aka.ms/OfficeSecurityReleases</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/officeupdates/office365-proplus-security-updates</vuln:URL>
        <vuln:ProductID>11762</vuln:ProductID>
        <vuln:ProductID>11763</vuln:ProductID>
        <vuln:ProductID>11952</vuln:ProductID>
        <vuln:ProductID>11953</vuln:ProductID>
        <vuln:ProductID>12420</vuln:ProductID>
        <vuln:ProductID>12421</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Click to Run</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Haifei Li with &lt;a href="https://pub.expmon.com/"&gt;EXPMON&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="74">
    <vuln:Title>NTFS Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Out-of-bounds read in Windows NTFS allows an unauthorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L) while user interaction is required (UI:R). What does that mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker can trick a local user on a vulnerable system into mounting a specially crafted VHD that would then trigger the vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows NTFS"
        Type="Tag"
        Ordinal="20">Windows NTFS</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-32707</vuln:CVE>
    <vuln:CWE
      ID="CWE-125">Out-of-bounds Read</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://infosec.exchange/@wdormann"&gt;Will Dormann&lt;/a&gt; with &lt;a href="https://vu.ls/"&gt;Vul Labs&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="43">
    <vuln:Title>Azure Storage Resource Provider Spoofing Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Server-side request forgery (ssrf) in Azure Storage Resource Provider allows an authorized attacker to perform spoofing over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.&lt;/p&gt;
&lt;p&gt;Please see &lt;a href="https://aka.ms/MSRC-Cloud-CVEs"&gt;Toward greater transparency: Unveiling Cloud Service CVEs&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure Storage Resource Provider"
        Type="Tag"
        Ordinal="20">Azure Storage Resource Provider</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">No</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29972</vuln:CVE>
    <vuln:CWE
      ID="CWE-918">Server-Side Request Forgery (SSRF)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>16750</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Spoofing</vuln:Description>
        <vuln:ProductID>16750</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>16750</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>16750</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://x.com/g1nd1l4"&gt;G1ND1L4&lt;/a&gt; with Microsoft</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
      <vuln:Acknowledgment>
        <vuln:Name>Stav Nir with Microsoft</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-08T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="12">
    <vuln:Title>Azure Automation Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper authorization in Azure Automation allows an authorized attacker to elevate privileges over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.&lt;/p&gt;
&lt;p&gt;Please see &lt;a href="https://aka.ms/MSRC-Cloud-CVEs"&gt;Toward greater transparency: Unveiling Cloud Service CVEs&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure Automation"
        Type="Tag"
        Ordinal="20">Azure Automation</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">No</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29827</vuln:CVE>
    <vuln:CWE
      ID="CWE-285">Improper Authorization</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11656</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11656</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11656</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.9</vuln:BaseScore>
        <vuln:TemporalScore>8.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11656</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Shay Shavit</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-08T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="9">
    <vuln:Title>Azure DevOps Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Authentication bypass by assumed-immutable data in Azure DevOps allows an unauthorized attacker to elevate privileges over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.&lt;/p&gt;
&lt;p&gt;Please see &lt;a href="https://aka.ms/MSRC-Cloud-CVEs"&gt;Toward greater transparency: Unveiling Cloud Service CVEs&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Azure DevOps"
        Type="Tag"
        Ordinal="20">Azure DevOps</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">No</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-29813</vuln:CVE>
    <vuln:CWE
      ID="CWE-302">Authentication Bypass by Assumed-Immutable Data</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11998</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11998</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>11998</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>10.0</vuln:BaseScore>
        <vuln:TemporalScore>9.0</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11998</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Cameron Vincent with Microsoft</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-08T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="87">
    <vuln:Title>Microsoft Power Apps Information Disclosure Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Server-Side Request Forgery (SSRF) in Microsoft Power Apps allows an unauthorized attacker to disclose information over a network&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.&lt;/p&gt;
&lt;p&gt;Please see &lt;a href="https://aka.ms/MSRC-Cloud-CVEs"&gt;Toward greater transparency: Unveiling Cloud Service CVEs&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Power Apps"
        Type="Tag"
        Ordinal="20">Microsoft Power Apps</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">No</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-47733</vuln:CVE>
    <vuln:CWE
      ID="CWE-918">Server-Side Request Forgery (SSRF)</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12497</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Information Disclosure</vuln:Description>
        <vuln:ProductID>12497</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12497</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>9.1</vuln:BaseScore>
        <vuln:TemporalScore>7.9</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12497</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/stargravy"&gt;Evan Grant&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-08T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="86">
    <vuln:Title>Microsoft Dataverse Remote Code Execution Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Deserialization of untrusted data in Microsoft Dataverse allows an authorized attacker to execute code over a network.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. The purpose of this CVE is to provide further transparency.&lt;/p&gt;
&lt;p&gt;Please see &lt;a href="https://aka.ms/MSRC-Cloud-CVEs"&gt;Toward greater transparency: Unveiling Cloud Service CVEs&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Dataverse"
        Type="Tag"
        Ordinal="20">Microsoft Dataverse</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">No</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-47732</vuln:CVE>
    <vuln:CWE
      ID="CWE-502">Deserialization of Untrusted Data</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12338</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Remote Code Execution</vuln:Description>
        <vuln:ProductID>12338</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Critical</vuln:Description>
        <vuln:ProductID>12338</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:N/A</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>8.7</vuln:BaseScore>
        <vuln:TemporalScore>7.6</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12338</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations />
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://nl.linkedin.com/in/erik-donker-50a887bb"&gt;Erik Donker&lt;/a&gt; with Microsoft</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-08T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="81">
    <vuln:Title>Chromium: CVE-2025-4372 Use after free in WebAudio</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%C2%A05"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;136.0.3240.64&lt;/td&gt;
&lt;td&gt;5/8/2025&lt;/td&gt;
&lt;td&gt;136.0.7103.93&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4372</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>v136.0.3240.64</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-08T23:20:05</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="84">
    <vuln:Title>Microsoft Defender for Endpoint Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Improper access control in Microsoft Defender for Endpoint allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;How can I verify that the update is installed?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Customers wanting to ensure the client has been updated can run the MDE Client Analyzer on the device.  When running the analyzer on a Windows device that does not have the security update, the analyzer will present a warning (ID 121035) indicating missing patch and directing to relevant online article.  Additionally, if the update is installed, but the Anti-Spoofing capability is not in a stable state, the analyzer will present warning (ID 121036) indicating an issue and providing additional online guidance or callout to reach out to Microsoft support if issue persists.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Defender for Endpoint"
        Type="Tag"
        Ordinal="20">Microsoft Defender for Endpoint</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-47161</vuln:CVE>
    <vuln:CWE
      ID="CWE-284">Improper Access Control</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>12015</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12015</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12015</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Unlikely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12015</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL>https://learn.microsoft.com/en-us/defender-endpoint/linux-whatsnew#releases-for-defender-for-endpoint-on-linux</vuln:URL>
        <vuln:ProductID>12015</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>101.25022.0002</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://learn.microsoft.com/en-us/defender-endpoint/linux-whatsnew#releases-for-defender-for-endpoint-on-linux</vuln:URL>
        <vuln:ProductID>12015</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>Rich Mirch with &lt;a href="https://www.stratascale.com/"&gt;Stratascale Cyber Research Unit&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-15T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-07-08T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Updated links to security updates.  This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="82">
    <vuln:Title>Chromium: CVE-2025-4609 Incorrect handle provided in unspecified circumstances in Mojo</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2025"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;136.0.3240.76&lt;/td&gt;
&lt;td&gt;5/15/2025&lt;/td&gt;
&lt;td&gt;136.0.7103.113&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4609</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>136.0.3240.76</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-15T17:20:53</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="83">
    <vuln:Title>Chromium: CVE-2025-4664 Insufficient policy enforcement in Loader</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/2025"&gt;Google Chrome Releases&lt;/a&gt; for more information. Google is aware of reports that an exploit for CVE-2025-4664 exists in the wild.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;136.0.3240.76&lt;/td&gt;
&lt;td&gt;5/15/2025&lt;/td&gt;
&lt;td&gt;136.0.7103.113&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4664</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>136.0.3240.76</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-15T17:20:49</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="2">
    <vuln:Title>Kernel Streaming Service Driver Elevation of Privilege Vulnerability</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;Heap-based buffer overflow in Windows Kernel allows an authorized attacker to elevate privileges locally.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What privileges could be gained by an attacker who successfully exploited this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;According to the CVSS metric, the attack vector is local (AV:L). What does this mean for this vulnerability?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The attacker would have to be an authenticated user logged on to the vulnerable system to be able to exploit this vulnerability.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="Windows Kernel"
        Type="Tag"
        Ordinal="20">Windows Kernel</vuln:Note>
      <vuln:Note
        Title="Microsoft"
        Type="CNA"
        Ordinal="30">Microsoft</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-24063</vuln:CVE>
    <vuln:CWE
      ID="CWE-122">Heap-based Buffer Overflow</vuln:CWE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Impact">
        <vuln:Description>Elevation of Privilege</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description>Important</vuln:Description>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Exploit Status">
        <vuln:Description>Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation More Likely</vuln:Description>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11568</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11569</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11571</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11572</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11923</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11924</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11929</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11930</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>11931</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12085</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12086</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12097</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12098</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12099</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12437</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12242</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12243</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12244</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12389</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12390</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>12436</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10729</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10735</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10852</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10853</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10816</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10855</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9312</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10287</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9318</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>9344</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10051</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10049</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10378</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10379</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10483</vuln:ProductID>
      </vuln:ScoreSet>
      <vuln:ScoreSet>
        <vuln:BaseScore>7.8</vuln:BaseScore>
        <vuln:TemporalScore>6.8</vuln:TemporalScore>
        <vuln:Vector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C</vuln:Vector>
        <vuln:ProductID>10543</vuln:ProductID>
      </vuln:ScoreSet>
    </vuln:CVSSScoreSets>
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058392</vuln:URL>
        <vuln:Supercedence>5055519</vuln:Supercedence>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.17763.7314</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058392</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058392</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058392</vuln:URL>
        <vuln:ProductID>11568</vuln:ProductID>
        <vuln:ProductID>11569</vuln:ProductID>
        <vuln:ProductID>11571</vuln:ProductID>
        <vuln:ProductID>11572</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058385</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058385</vuln:URL>
        <vuln:Supercedence>5055526</vuln:Supercedence>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3692</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058385</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:ProductID>11924</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058385</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058500</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.20348.3630</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058500</vuln:URL>
        <vuln:ProductID>11923</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058500</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19044.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>11929</vuln:ProductID>
        <vuln:ProductID>11930</vuln:ProductID>
        <vuln:ProductID>11931</vuln:ProductID>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22621.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12085</vuln:ProductID>
        <vuln:ProductID>12086</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058379</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058379</vuln:URL>
        <vuln:Supercedence>5055518</vuln:Supercedence>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.19045.5854</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058379</vuln:URL>
        <vuln:ProductID>12097</vuln:ProductID>
        <vuln:ProductID>12098</vuln:ProductID>
        <vuln:ProductID>12099</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058379</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058411</vuln:URL>
        <vuln:Supercedence>5055523</vuln:Supercedence>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.4061</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058411</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058411</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058411</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058497</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>SecurityHotpatchUpdate</vuln:SubType>
        <vuln:FixedBuild>10.0.26100.3981</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058497</vuln:URL>
        <vuln:ProductID>12437</vuln:ProductID>
        <vuln:ProductID>12389</vuln:ProductID>
        <vuln:ProductID>12390</vuln:ProductID>
        <vuln:ProductID>12436</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058497</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058405</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058405</vuln:URL>
        <vuln:Supercedence>5055528</vuln:Supercedence>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.22631.5335</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058405</vuln:URL>
        <vuln:ProductID>12242</vuln:ProductID>
        <vuln:ProductID>12243</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058405</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058384</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058384</vuln:URL>
        <vuln:Supercedence>5055527</vuln:Supercedence>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.25398.1611</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058384</vuln:URL>
        <vuln:ProductID>12244</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058384</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058387</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058387</vuln:URL>
        <vuln:Supercedence>5055547</vuln:Supercedence>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.10240.21014</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058387</vuln:URL>
        <vuln:ProductID>10729</vuln:ProductID>
        <vuln:ProductID>10735</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058387</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058383</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058383</vuln:URL>
        <vuln:Supercedence>5055521</vuln:Supercedence>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>10.0.14393.8066</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058383</vuln:URL>
        <vuln:ProductID>10852</vuln:ProductID>
        <vuln:ProductID>10853</vuln:ProductID>
        <vuln:ProductID>10816</vuln:ProductID>
        <vuln:ProductID>10855</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058383</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058449</vuln:URL>
        <vuln:Supercedence>5055609</vuln:Supercedence>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058449</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058449</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058449</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.0.6003.23279</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058429</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Known Issue">
        <vuln:Description>5058429</vuln:Description>
        <vuln:URL>https://support.microsoft.com/help/5058429</vuln:URL>
        <vuln:ProductID>9312</vuln:ProductID>
        <vuln:ProductID>10287</vuln:ProductID>
        <vuln:ProductID>9318</vuln:ProductID>
        <vuln:ProductID>9344</vuln:ProductID>
        <vuln:AffectedFiles />
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058430</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058430</vuln:URL>
        <vuln:Supercedence>5055561</vuln:Supercedence>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058430</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058430</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058454</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Security Only</vuln:SubType>
        <vuln:FixedBuild>6.1.7601.27729</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058454</vuln:URL>
        <vuln:ProductID>10051</vuln:ProductID>
        <vuln:ProductID>10049</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058454</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058451</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058451</vuln:URL>
        <vuln:Supercedence>5055581</vuln:Supercedence>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.2.9200.25475</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058451</vuln:URL>
        <vuln:ProductID>10378</vuln:ProductID>
        <vuln:ProductID>10379</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058451</vuln:SubType>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>5058403</vuln:Description>
        <vuln:URL>https://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB5058403</vuln:URL>
        <vuln:Supercedence>5055557</vuln:Supercedence>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>Yes</vuln:RestartRequired>
        <vuln:SubType>Monthly Rollup</vuln:SubType>
        <vuln:FixedBuild>6.3.9600.22577</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://support.microsoft.com/help/5058403</vuln:URL>
        <vuln:ProductID>10483</vuln:ProductID>
        <vuln:ProductID>10543</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>5058403</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments>
      <vuln:Acknowledgment>
        <vuln:Name>&lt;a href="https://twitter.com/scwuaptx"&gt;Angelboy (@scwuaptx)&lt;/a&gt; with &lt;a href="https://devco.re/"&gt;DEVCORE&lt;/a&gt;</vuln:Name>
        <vuln:URL />
      </vuln:Acknowledgment>
    </vuln:Acknowledgments>
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-13T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="78">
    <vuln:Title>Chromium: CVE-2025-4051 Insufficient data validation in DevTools</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%C2%A05"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;136.0.3240.50&lt;/td&gt;
&lt;td&gt;5/1/2025&lt;/td&gt;
&lt;td&gt;136.0.7103.49&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4051</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>136.0.3240.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Corrected CVE title. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-01T22:16:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
  <vuln:Vulnerability
    Ordinal="79">
    <vuln:Title>Chromium: CVE-2025-4052 Inappropriate implementation in DevTools</vuln:Title>
    <vuln:Notes>
      <vuln:Note
        Title="Description"
        Type="Description"
        Ordinal="0">&lt;p&gt;This CVE was assigned by Chrome.  Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see &lt;a href="https://chromereleases.googleblog.com/202%C2%A05"&gt;Google Chrome Releases&lt;/a&gt; for more information.&lt;/p&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;What is the version information for this release?&lt;/strong&gt;&lt;/p&gt;
&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Microsoft Edge Version&lt;/th&gt;
&lt;th&gt;Date Released&lt;/th&gt;
&lt;th&gt;Based on Chromium Version&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;136.0.3240.50&lt;/td&gt;
&lt;td&gt;5/1/2025&lt;/td&gt;
&lt;td&gt;136.0.7103.49&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
</vuln:Note>
      <vuln:Note
        Title="FAQ"
        Type="FAQ"
        Ordinal="10">&lt;p&gt;&lt;strong&gt;Why is this Chrome CVE included in the Security Update Guide?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;How can I see the version of the browser?&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;Help and Feedback&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;Click on &lt;strong&gt;About Microsoft Edge&lt;/strong&gt;&lt;/li&gt;
&lt;/ol&gt;
</vuln:Note>
      <vuln:Note
        Title="Microsoft Edge (Chromium-based)"
        Type="Tag"
        Ordinal="20">Microsoft Edge (Chromium-based)</vuln:Note>
      <vuln:Note
        Title="Chrome"
        Type="CNA"
        Ordinal="30">Chrome</vuln:Note>
      <vuln:Note
        Title="Customer Action Required"
        Type="Other"
        Ordinal="40">Yes</vuln:Note>
    </vuln:Notes>
    <vuln:CVE>CVE-2025-4052</vuln:CVE>
    <vuln:ProductStatuses>
      <vuln:Status
        Type="Known Affected">
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Status>
    </vuln:ProductStatuses>
    <vuln:Threats>
      <vuln:Threat
        Type="Impact">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
      <vuln:Threat
        Type="Severity">
        <vuln:Description />
        <vuln:ProductID>11655</vuln:ProductID>
      </vuln:Threat>
    </vuln:Threats>
    <vuln:CVSSScoreSets />
    <vuln:Remediations>
      <vuln:Remediation
        Type="Vendor Fix">
        <vuln:Description>Release Notes</vuln:Description>
        <vuln:URL />
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:RestartRequired>No</vuln:RestartRequired>
        <vuln:SubType>Security Update</vuln:SubType>
        <vuln:FixedBuild>136.0.3240.50</vuln:FixedBuild>
      </vuln:Remediation>
      <vuln:Remediation
        Type="Release Notes">
        <vuln:URL>https://docs.microsoft.com/en-us/DeployEdge/microsoft-edge-relnotes-security</vuln:URL>
        <vuln:ProductID>11655</vuln:ProductID>
        <vuln:AffectedFiles />
        <vuln:SubType>Release Notes</vuln:SubType>
      </vuln:Remediation>
    </vuln:Remediations>
    <vuln:Acknowledgments />
    <vuln:RevisionHistory>
      <vuln:Revision>
        <cvrf:Number>1.1</cvrf:Number>
        <cvrf:Date>2025-05-09T07:00:00</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Corrected CVE title. This is an informational change only.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
      <vuln:Revision>
        <cvrf:Number>1.0</cvrf:Number>
        <cvrf:Date>2025-05-01T22:16:02</cvrf:Date>
        <cvrf:Description>&lt;p&gt;Information published.&lt;/p&gt;
</cvrf:Description>
      </vuln:Revision>
    </vuln:RevisionHistory>
  </vuln:Vulnerability>
</cvrf:cvrfdoc>