Download
| Alert*
oval:org.secpod.oval:def:41037
The host is missing a critical security update KB4020735 oval:org.secpod.oval:def:41038 The host is missing a critical security update KB4020736 oval:org.secpod.oval:def:41035 The host is missing a critical security update KB4020733 oval:org.secpod.oval:def:41036 The host is missing a critical security update KB4020734 oval:org.secpod.oval:def:41034 The host is missing a critical security update KB4020732 oval:org.secpod.oval:def:41032 The host is missing a critical security update KB3203427 oval:org.secpod.oval:def:40941 The host is missing security update for KB4022884 oval:org.secpod.oval:def:41026 The host is missing a critical security update KB3191837 oval:org.secpod.oval:def:41027 The host is missing a critical security update KB3191844 oval:org.secpod.oval:def:41107 The host is missing security update for KB4022722 oval:org.secpod.oval:def:41105 The host is missing an important security update KB4022717 oval:org.secpod.oval:def:41106 The host is missing an important security update KB4022718 oval:org.secpod.oval:def:40935 The host is missing security update for KB4022719 oval:org.secpod.oval:def:40936 The host is missing an important security update KB4022724 oval:org.secpod.oval:def:40938 The host is missing an important security update KB4022726 oval:org.secpod.oval:def:40933 The host is missing an important security update KB4022714 oval:org.secpod.oval:def:40937 The host is missing an important security update KB4022725 oval:org.secpod.oval:def:40939 The host is missing an important security update KB4022727 oval:org.secpod.oval:def:40934 The host is missing an important security update KB4022715 oval:org.secpod.oval:def:41040 The host is missing a critical security update KB4023307 oval:org.secpod.oval:def:41039 The host is missing a critical security update KB3203382 oval:org.secpod.oval:def:40959 A remote code execution vulnerability exists due to the way Windows Uniscribe handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts ... |