Posted April 12, 201113 yr FPCH Admin Bulletin Severity Rating:Important - This security update resolves thirty privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. View the full article Another Forum - Unlike the Rest
April 12, 201113 yr Author FPCH Admin Bulletin Severity Rating:Important - This security update resolves thirty privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. View the full article Another Forum - Unlike the Rest
April 12, 201113 yr Author FPCH Admin Bulletin Severity Rating:Important - This security update resolves thirty privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. View the full article Another Forum - Unlike the Rest
April 12, 201113 yr Author FPCH Admin Bulletin Severity Rating:Important - This security update resolves thirty privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. View the full article Another Forum - Unlike the Rest
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.