The most severe of the vulnerabilities could allow elevation of privilege if an attacker logged on to the system and ran a specially crafted application. An attacker must have valid logon credentials and be able to log on locally to exploit any of these vulnerabilities. The vulnerabilities could not be exploited remotely or by anonymous users.
-</p>
Make your website safer. Use external penetration testing service. First report ready in one hour!</p>
**Hidden Content: To see this hidden content your post count must be 1 or greater.**