FPCH Admin AWS Posted April 12, 2011 FPCH Admin Posted April 12, 2011 Bulletin Severity Rating:Important - This security update resolves thirty privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. View the full article Quote Off Topic Forum - Unlike the Rest
FPCH Admin AWS Posted April 12, 2011 Author FPCH Admin Posted April 12, 2011 Bulletin Severity Rating:Important - This security update resolves thirty privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. View the full article Quote Off Topic Forum - Unlike the Rest
FPCH Admin AWS Posted April 12, 2011 Author FPCH Admin Posted April 12, 2011 Bulletin Severity Rating:Important - This security update resolves thirty privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. View the full article Quote Off Topic Forum - Unlike the Rest
FPCH Admin AWS Posted April 12, 2011 Author FPCH Admin Posted April 12, 2011 Bulletin Severity Rating:Important - This security update resolves thirty privately reported vulnerabilities in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on locally and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users. View the full article Quote Off Topic Forum - Unlike the Rest
Recommended Posts