Windows with another zero-day exploit

Windows with another zero-day exploit

Beware! A new security vulnerability in Windows has been disclosed and immediately patched “zero-day”. However, securing against it is simple and maintains the “principles of intelligent use of the PC”.

The problem was discovered by SandboxEscaper, which published its findings on the GitHub platform. This was then confirmed by Will Dormann of US_CERT, who verified this finding and stated that it “works great on a fully updated 64-bit Windows 10”. The new exploit relates to a “local privilege escalation flaw in the Microsoft Windows Task Scheduler”. That’s a pretty good explanation, isn’t it? More importantly, in order to take advantage of this vulnerability, the attacker must infect the victim’s system.

This means that if you do not click on the links without thinking, do not download unknown files and you just … use your computer skillfully, then you will be safe. However, the exploit is quite serious as it scored 6.4 on the CVSS scale out of a possible 6.8. While we shouldn’t be too scared of this vulnerability, delete the entire operating system and ultimately destroy the PC / laptop to tiny bits, we should be a bit more careful on the web now. Especially since Microsoft will not patch this vulnerability until September 11th. At least this is the result of the latest information from the spokesman, who refers to the traditional schedule of Tuesday’s updates.

Read This Now:   They helped Elon Musk with the cosmic vision, and now they design autonomous and energy-saving trains

Source: TechSpot
Photos: Microsoft, TechSpot


Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5373

Notice: ob_end_flush(): failed to send buffer of zlib output compression (1) in /home/gamefeve/bitcoinminershashrate.com/wp-includes/functions.php on line 5373