If successful, an attacker can manipulate files used by Windows Logon, cause Denial of Service (DoS) by deleting file(s), or replace system files to potentially achieve elevation of privileges. ![]() This allows an attacker with local user privileges to coerce the installer to write to arbitrary privileged directories. The Windows Logon installer prior to 4.1.2 did not properly validate file installation paths. Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |