Top
Microsoft Windows Task Scheduler zero-day and PoC exploit disclosed via Twitter – ANITH
fade
213264
post-template-default,single,single-post,postid-213264,single-format-standard,eltd-core-1.1.1,flow child-child-ver-1.0.0,flow-ver-1.3.6,eltd-smooth-scroll,eltd-smooth-page-transitions,ajax,eltd-blog-installed,page-template-blog-standard,eltd-header-standard,eltd-fixed-on-scroll,eltd-default-mobile-header,eltd-sticky-up-mobile-header,eltd-dropdown-default,wpb-js-composer js-comp-ver-5.0.1,vc_responsive

Microsoft Windows Task Scheduler zero-day and PoC exploit disclosed via Twitter

Microsoft Windows Task Scheduler zero-day and PoC exploit disclosed via Twitter

There’s a Windows zero-day in the wild thanks to Twitter user “SandboxEscaper” who revealed the local privilege escalation vulnerability and proof-of-concept exploit via Twitter. The researcher, who claims to be tired of IT security work, added:

After tweeting about the local privilege escalation vulnerability in the ALPC interface for Microsoft Windows task scheduler, and linking to the PoC on GitHub, SandboxEscaper claimed she or he would be “gone” for a bit.

To read this article in full, please click here

https://platform.twitter.com/widgets.js

Source link

Anith Gopal
No Comments

Post a Comment

two × two =

This site uses Akismet to reduce spam. Learn how your comment data is processed.