{"id":3075,"date":"2019-05-24T07:24:38","date_gmt":"2019-05-24T06:24:38","guid":{"rendered":"https:\/\/werle.pro\/?p=3075"},"modified":"2019-05-24T07:24:40","modified_gmt":"2019-05-24T06:24:40","slug":"ssi-os-4-new-microsoft-zero-day-exploits","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2019\/05\/24\/ssi-os-4-new-microsoft-zero-day-exploits\/","title":{"rendered":"SSI OS &#8211; 4 New Microsoft Zero-Day Exploits"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3077 alignnone size-full\" src=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/05\/kuyyhx2z2983225191849276365.jpg?resize=680%2C355&#038;ssl=1\" width=\"680\" height=\"355\" srcset=\"https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/05\/kuyyhx2z2983225191849276365.jpg?w=680&amp;ssl=1 680w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/05\/kuyyhx2z2983225191849276365.jpg?resize=200%2C104&amp;ssl=1 200w, https:\/\/i0.wp.com\/werle.pro\/wp-content\/uploads\/2019\/05\/kuyyhx2z2983225191849276365.jpg?resize=512%2C267&amp;ssl=1 512w\" sizes=\"(max-width: 680px) 100vw, 680px\" data-recalc-dims=\"1\" \/><\/p>\n<p>Upon successful exploitation, an attacker can delete or edit any Windows file, including system executables, which otherwise only a privileged user can do.<\/p>\n<p>Dubbed AngryPolarBearBug2 by the hacker, the vulnerability is a successor to a previous Windows Error Reporting service vulnerability she found late last year, which was named AngryPolarBearBug and allowed a local, unprivileged attacker to overwrite any chosen file on the system.<\/p>\n<p><a href=\"https:\/\/thehackernews.com\/2019\/05\/microsoft-zero-day-vulnerability.html?m=1\">https:\/\/thehackernews.com\/2019\/05\/microsoft-zero-day-vulnerability.html<\/a><\/p>\n<p>https:\/\/mobile.twitter.com\/TheHackersNews\/status\/1131567152522178560<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Upon successful exploitation, an attacker can delete or edit any Windows file, including system executables, which otherwise only a privileged user can do. Dubbed AngryPolarBearBug2 by the hacker, the vulnerability is a successor to a previous Windows Error Reporting service vulnerability she found late last year, which was named AngryPolarBearBug and allowed a local, unprivileged &#8230; <a title=\"SSI OS &#8211; 4 New Microsoft Zero-Day Exploits\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2019\/05\/24\/ssi-os-4-new-microsoft-zero-day-exploits\/\" aria-label=\"Read more about SSI OS &#8211; 4 New Microsoft Zero-Day Exploits\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-NB","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3075"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=3075"}],"version-history":[{"count":2,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3075\/revisions"}],"predecessor-version":[{"id":3078,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3075\/revisions\/3078"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=3075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=3075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=3075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}