Download
| Alert*
oval:org.secpod.oval:def:54860
The host is missing an important security update for KB4498961 oval:org.secpod.oval:def:54861 The host is missing an important security update for KB4498962 oval:org.secpod.oval:def:54857 The host is missing an important security update for KB4495611 oval:org.secpod.oval:def:54858 The host is missing an important security update for KB4495613 oval:org.secpod.oval:def:54859 The host is missing an important security update for KB4495616 oval:org.secpod.oval:def:54865 The host is missing an important security update for KB4499406 oval:org.secpod.oval:def:54862 The host is missing an important security update for KB4498963 oval:org.secpod.oval:def:54863 The host is missing an important security update for KB4498964 oval:org.secpod.oval:def:54868 The host is missing an important security update for KB4499409 oval:org.secpod.oval:def:54866 The host is missing an important security update for KB4499407 oval:org.secpod.oval:def:54867 The host is missing an important security update for KB4499408 oval:org.secpod.oval:def:55326 The host is missing an important security update for KB4495620 oval:org.secpod.oval:def:54751 The host is missing an important security update for KB4499179 oval:org.secpod.oval:def:54748 The host is missing an important security update for KB4499167 oval:org.secpod.oval:def:54753 The host is missing an important security update for KB4499181 oval:org.secpod.oval:def:54744 The host is missing an important security update for KB4499154 oval:org.secpod.oval:def:54740 The host is missing an important security update for KB4494440 oval:org.secpod.oval:def:54856 The host is missing an important security update for KB4495610 oval:org.secpod.oval:def:54864 The host is missing an important security update for KB4499405 oval:org.secpod.oval:def:54762 A denial of service vulnerability exists when .NET Framework improperly handles objects in heap memory. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application. To exploit this vulnerability, an attacker would have to log on to an affected ... |