Patrick Münch
Patrick Münch
@tas50 i think the behavior is correct because the package file is still on the system, and this means the vulnerability is still on the system
@vjeffrey Yes, i think so. If the mondoo service runs in Windows, it is executed as the NTAuthority user. This user has the highest permissions within Windows.
@imilchev the updated to version 10.3.4 and we still see the issue. 

@imilchev yes i will do it
via cnspec service on the linux vm