Security News > 2019 > June > Hacker Discloses Second Zero-Day to Bypass Patch for Windows EoP Flaw
![Hacker Discloses Second Zero-Day to Bypass Patch for Windows EoP Flaw](/static/build/img/news/alt/cyber-threat-stats-medium.jpg)
2019-06-07 10:48
An anonymous security researcher going by the name of SandboxEscaper today publicly shared a second zero-day exploit that can be used to bypass a recently patched elevation of privilege vulnerability in the Microsoft Windows operating system. SandboxEscaper is known for publicly dropping zero-day exploits for unpatched Windows vulnerabilities. In the past year, the hacker has disclosed over half
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/fWKRSwPNfko/windows-eop-exploit.html
Related news
- Exploit for critical Progress Telerik auth bypass released, patch now (source)
- Exploit for critical Veeam auth bypass available, patch now (source)
- Black Basta ransomware gang linked to Windows zero-day attacks (source)
- Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw (source)
- Ransomware crew may have exploited Windows make-me-admin bug as a zero-day (source)
- Exploit for Veeam Recovery Orchestrator auth bypass available, patch now (source)
- Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor (source)
- Hackers target new MOVEit Transfer critical auth bypass bug (source)
- Chinese Hackers Exploiting Cisco Switches Zero-Day to Deliver Malware (source)
- Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days (source)