I've confirmed that this works on a fully-patched (latest May updates) Windows 10 (1809 and 1903) system. This exploit allows a normal desktop user to gain full control of a protected file.https://twitter.com/campuscodi/status/1136950963154161664 …
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
I haven't been able to reproduce this exploit on a system that has July's updates from Microsoft. I can't find any official statement about it being patched, but honestly, I can't really navigate the Patch Tuesday pubs since they switched from "MS" to "CVE" IDs. Is it fixed?
Indeed using "start microsoft-edge:" does work. No clicky needed!pic.twitter.com/yDQq2uCTAZ
Do the newer features in Windows 10 Enterprise (Device Guard, Application Guard, Memory Integrity, etc.) mitigate this?
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.