Right on the heels of a privilege escalation zero-day vulnerability for Windows 10 released yesterday, the same researcher has released exploit code for two more vulnerabilities today.
A security researcher named SandboxEscaper is known for dropping zero-day vulnerabilities and exploits for Microsoft. Just yesterday, the researcher
released a local privilege escalation vulnerability that utilizes the Windows 10 Task Scheduler. When used, the vulnerability allows users gain permissions to files that they would normally not have.
Today, SandboxEscaper released
code that exploits two more vulnerabilities; one local privilege escalation vulnerability in Windows Error Reporting (tracked as CVE-2019-0863) and a sandbox escape vulnerability for Internet Explorer 11.
The only reason given for releasing these vulnerabilities is the
following post from SandboxEscaper's blog.