[BESAdmin-Announcements] Content Modification in Windows Point of Sale
Announcements for BES Administrators
besadmin-announcements at bigmail.bigfix.com
Thu Jun 9 01:27:18 PDT 2016
Content in the Windows Point of Sale site has been modified:
Fully Superseded Fixlets:
[Major] MS13-101: Vulnerabilities in Windows Kernel-Mode Drivers Could
Allow Elevation of Privilege - Windows XP SP3 - WPOS (Superseded) (ID:
1310101)
[Major] MS13-101: Vulnerabilities in Windows Kernel-Mode Drivers Could
Allow Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH - WPOS
(Superseded) (ID: 1310102)
[Major] MS13-076: Vulnerabilities in Kernel-Mode Drivers Could Allow
Elevation of Privilege - Windows XP SP3 - WPOS (Superseded) (ID:
1307601)
[Major] MS13-076: Vulnerabilities in Kernel-Mode Drivers Could Allow
Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH - WPOS (Superseded)
(ID: 1307602)
[Major] MS13-053: Vulnerabilities in Windows Kernel-Mode Drivers Could
Allow Remote Code Execution - Windows XP SP3 - WPOS (Superseded) (ID:
1305301)
[Major] MS13-053: Vulnerabilities in Windows Kernel-Mode Drivers Could
Allow Remote Code Execution - Windows XP SP3 - CORRUPT PATCH - WPOS
(Superseded) (ID: 1305302)
[Major] MS13-036: Vulnerabilities in Kernel-Mode Driver Could Allow
Elevation Of Privilege - Windows XP SP3 - WPOS (Superseded) (ID:
1303601)
[Major] MS13-036: Vulnerabilities in Kernel-Mode Driver Could Allow
Elevation Of Privilege - Windows XP SP3 - CORRUPT PATCH - WPOS (Superseded)
(ID: 1303602)
[Major] MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow
Elevation of Privilege - Windows XP SP3 - WPOS (Superseded) (ID:
1301601)
[Major] MS13-016: Vulnerabilities in Windows Kernel-Mode Driver Could Allow
Elevation of Privilege - Windows XP SP3 - CORRUPT PATCH - WPOS (Superseded)
(ID: 1301602)
Reason for Update:
Fixlets for MS13-101, MS13-076, MS13-053, MS13-036, MS13-016 were
superseded by MS14-015.
Actions to Take:
None
Published site version:
Windows Point of Sale, version 128.
Additional links:
None
Application Engineering Team
IBM BigFix
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://bigmail.bigfix.com/pipermail/besadmin-announcements/attachments/20160609/534b6c8a/attachment.html>
More information about the Besadmin-announcements
mailing list