[BESAdmin-Announcements] Content Modification in Windows Point of Sale

Announcements for BES Administrators besadmin-announcements at bigmail.bigfix.com
Thu Jun 9 01:27:18 PDT 2016


Content in the Windows Point of Sale site has been modified:


Fully Superseded Fixlets:
[Major] MS13-101: Vulnerabilities in Windows Kernel-Mode Drivers Could
Allow Elevation of Privilege - Windows XP SP3 - WPOS (Superseded)    (ID:
1310101)
[Major] MS13-101: Vulnerabilities in Windows Kernel-Mode Drivers Could
Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH - WPOS
(Superseded)    (ID: 1310102)
[Major] MS13-076: Vulnerabilities in Kernel-Mode Drivers Could Allow
Elevation of Privilege - Windows XP SP3 - WPOS (Superseded)    (ID:
1307601)
[Major] MS13-076: Vulnerabilities in Kernel-Mode Drivers Could Allow
Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH - WPOS (Superseded)
(ID: 1307602)
[Major] MS13-053: Vulnerabilities in Windows Kernel-Mode Drivers Could
Allow Remote Code Execution - Windows XP SP3 - WPOS (Superseded)    (ID:
1305301)
[Major] MS13-053: Vulnerabilities in Windows Kernel-Mode Drivers Could
Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH - WPOS
(Superseded)    (ID: 1305302)
[Major] MS13-036: Vulnerabilities in Kernel-Mode Driver Could Allow
Elevation Of Privilege - Windows XP SP3 - WPOS (Superseded)    (ID:
1303601)
[Major] MS13-036: Vulnerabilities in Kernel-Mode Driver Could Allow
Elevation Of Privilege - Windows XP SP3 - CORRUPT PATCH - WPOS (Superseded)
(ID: 1303602)
[Major] MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow
Elevation of Privilege - Windows XP SP3 - WPOS (Superseded)    (ID:
1301601)
[Major] MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow
Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH - WPOS (Superseded)
(ID: 1301602)


Reason for Update:
Fixlets for MS13-101, MS13-076, MS13-053, MS13-036, MS13-016 were
superseded by MS14-015.


Actions to Take:

None


Published site version:

Windows Point of Sale, version 128.


Additional links:

None


Application Engineering Team
IBM BigFix

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20160609/534b6c8a/attachment.html>


More information about the Besadmin-announcements mailing list