Source: cnBeta
SandboxEscaper re-launched a new privilege escalation 0day code, which were full of hatred for Microsoft female *** again defeated the patch for CVE-2019-0841 Microsoft released in April, and as usual, released a proof of concept that came vulnerability exploit code, which means that other fast *** *** method for making reference to the malware *** Windows system.
Fortunately, however, is the vulnerability to run code on the local computer, remote *** can not be achieved, the more hazardous place is that it allows *** has limited privileges to gain full control of the protected files, such as her demonstrate vulnerabilities in win.ini.
CERT / CC has confirmed that this applies to exploit to run Microsoft's latest security updates for Windows 10 versions 1809 and 1903.
Since August 2018, SandboxEscaper been frantically released nine 0day *** method.
Product is slightly Library http://www.pinlue.com/