Download
| Alert*
oval:org.secpod.oval:def:74338
The host is missing a critical security update for KB5005076 oval:org.secpod.oval:def:74339 The host is missing a critical security update for KB5005088 oval:org.secpod.oval:def:74345 The host is missing a critical security update for KB5005106 oval:org.secpod.oval:def:74334 The host is missing a critical security update for KB5005033 oval:org.secpod.oval:def:74343 The host is missing a critical security update for KB5005095 oval:org.secpod.oval:def:74344 The host is missing a critical security update for KB5005099 oval:org.secpod.oval:def:74333 The host is missing a critical security update for KB5005031 oval:org.secpod.oval:def:74341 The host is missing a critical security update for KB5005090 oval:org.secpod.oval:def:74342 The host is missing a critical security update for KB5005094 oval:org.secpod.oval:def:74340 The host is missing a critical security update for KB5005089 oval:org.secpod.oval:def:74336 The host is missing a critical security update for KB5005040 oval:org.secpod.oval:def:74337 The host is missing a critical security update for KB5005043 oval:org.secpod.oval:def:74302 Windows TCP/IP Remote Code Execution Vulnerability. This is remotely triggerable by a malicious Hyper-V guest sending an ipv6 ping to the Hyper-V host. An attacker could send a specially crafted TCPIP packet to its host utilizing the TCPIP Protocol Stack (tcpip.sys) to process packets. oval:org.secpod.oval:def:74332 The host is missing a critical security update for KB5005030 |