Security News > 2019 > June > Hacker Discloses Second Zero-Day to Bypass Patch for Windows EoP Flaw

2019-06-07 10:48
An anonymous security researcher going by the name of SandboxEscaper today publicly shared a second zero-day exploit that can be used to bypass a recently patched elevation of privilege vulnerability in the Microsoft Windows operating system. SandboxEscaper is known for publicly dropping zero-day exploits for unpatched Windows vulnerabilities. In the past year, the hacker has disclosed over half
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/fWKRSwPNfko/windows-eop-exploit.html
Related news
- New Windows zero-day leaks NTLM hashes, gets unofficial patch (source)
- Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication (source)
- Unpatched Windows Zero-Day Flaw Exploited by 11 State-Sponsored Threat Groups Since 2017 (source)
- New Windows zero-day exploited by 11 state hacking groups since 2017 (source)
- APTs have been using zero-day Windows shortcut exploit for eight years (ZDI-CAN-25373) (source)
- Critical flaw in Next.js lets hackers bypass authorization (source)
- EncryptHub linked to MMC zero-day attacks on Windows systems (source)
- Broadcom warns of authentication bypass in VMware Windows Tools (source)
- Google fixes exploited Chrome sandbox bypass zero-day (CVE-2025-2783) (source)
- Zero-Day Alert: Google Releases Chrome Patch for Exploit Used in Russian Espionage Attacks (source)