microsoft windows Concurrency, Inc. Achieves Microsoft Windows Virtual Desktop Specialization, Setting New Standards in Cloud Expertise By www.24-7pressrelease.com Published On :: Wed, 13 Dec 2023 08:00:00 GMT Achieving this Specialization is a milestone for Concurrency, showcasing dedication to innovation. It opens doors for future projects, welcomes new clients, and enhances Mergers and Acquisitions services, streamlining processes for exceptional value. Full Article
microsoft windows Problem Notes for SAS®9 - 66487: Authentication to the CAS server fails with the error "Access denied..." when initiated on a SAS/CONNECT server in a Microsoft Windows environment By Published On :: Mon, 31 Aug 2020 10:33:55 EST You might see the following error messages: "ERROR: Connection failed. Server returned: SAS Logon Manager authentication failed: Access denied." and "ERROR: Unable to connect to Cloud Analytic Services host-name on port 5570. Veri Full Article CONNECT+SAS/CONNECT
microsoft windows Problem Notes for SAS®9 - 66500: A content release on the SAS Risk Governance Framework fails to load when you use SAS 9.4M7 (TS1M7) on the Microsoft Windows operating system By Published On :: Wed, 19 Aug 2020 17:45:15 EST When you log on to the SAS Risk Governance Framework and choose a solution, the web application might fail to load the solution content. When the problem occurs, you continue to see "Loading..." on the screen, an Full Article RGPBNDL+SAS+Risk+Governance+Framework
microsoft windows Overview of the Microsoft Windows Operating Systems By www.bleepingcomputer.com Published On :: 2016-06-29T13:03:15-05:00 Full Article
microsoft windows IBM Cognos for Microsoft Office 11.0 Microsoft Windows 64bit Multilingual By www.ibm.com Published On :: Fri, 22 Dec 2017 00:00:00 -0700 IBM Cognos for Microsoft Office 11.0 Microsoft Windows 64bit Multilingual Full Article
microsoft windows IBM Cognos Analytics Server 11.1.5 Microsoft Windows Multilingual By www.ibm.com Published On :: Thu, 9 Jan 2020 00:00:00 -0700 IBM Cognos Analytics Server 11.1.5 Microsoft Windows Multilingual Full Article
microsoft windows IBM Planning Analytics for Microsoft Excel 2.0.48 32-bit Microsoft Windows Multilingual By www.ibm.com Published On :: Fri, 10 Jan 2020 00:00:00 -0700 IBM Planning Analytics for Microsoft Excel 2.0.48 32-bit Microsoft Windows Multilingual Full Article
microsoft windows IBM Cognos Analytics for Jupyter Notebook 11.1.6 Microsoft Windows Multilingual By www.ibm.com Published On :: Fri, 24 Apr 2020 00:00:00 -0600 IBM Cognos Analytics for Jupyter Notebook 11.1.6 Microsoft Windows Multilingual Full Article
microsoft windows IBM Cognos Transformer 11.0.0.68 Microsoft Windows Multilingual By www.ibm.com Published On :: Tue, 15 Oct 2019 00:00:00 -0600 IBM Cognos Transformer 11.0.0.68 Microsoft Windows Multilingual Full Article
microsoft windows IBM Planning Analytics 2.0.9 Microsoft Windows Multilingual By www.ibm.com Published On :: Fri, 10 Jan 2020 00:00:00 -0700 IBM Planning Analytics 2.0.9 Microsoft Windows Multilingual Full Article
microsoft windows IBM Planning Analytics for Microsoft Excel 2.0.48 64-bit Microsoft Windows Multilingual By www.ibm.com Published On :: Fri, 10 Jan 2020 00:00:00 -0700 IBM Planning Analytics for Microsoft Excel 2.0.48 64-bit Microsoft Windows Multilingual Full Article
microsoft windows IBM Cognos Analytics Installer 2.0.191205 Microsoft Windows Multilingual By www.ibm.com Published On :: Fri, 20 Dec 2019 00:00:00 -0700 IBM Cognos Analytics Installer 2.0.191205 Microsoft Windows Multilingual Full Article
microsoft windows IBM Cognos Analytics Server 11.1.6 Microsoft Windows Multilingual By www.ibm.com Published On :: Fri, 24 Apr 2020 00:00:00 -0600 IBM Cognos Analytics Server 11.1.6 Microsoft Windows Multilingual Full Article
microsoft windows IBM Cognos Analytics Installer 2.0.2003191 Microsoft Windows Multilingual By www.ibm.com Published On :: Fri, 24 Apr 2020 00:00:00 -0600 IBM Cognos Analytics Installer 2.0.2003191 Microsoft Windows Multilingual Full Article
microsoft windows IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 1: Generating certificates in AIX and importing certificates to Windows for IKE IPsec tunnels By www.ibm.com Published On :: 29 Nov 2017 05:00:00 +0000 Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits). Full Article aix
microsoft windows IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 2: IKEv1 IPsec tunnels between AIX 6.1 or later versions and Windows 2012 By www.ibm.com Published On :: 01 Dec 2017 05:00:00 +0000 Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits). Full Article aix
microsoft windows IPsec tunnel configuration between IBM AIX and Microsoft Windows, Part 3: IKEv2 IPsec tunnels between AIX 6.1 or later versions and Windows 2012 By www.ibm.com Published On :: 04 Dec 2017 05:00:00 +0000 Your article abstract goes here. Put the main points and key phrases at the beginning of the abstract, because it will be truncated in search results. Make your abstract enticing yet succinct. Aim for three to five sentences that express why the reader would care about the content (motive) and what he or she can gain from reading the content (benefits). Full Article aix
microsoft windows Microsoft Windows 10 By www.pcmag.com Published On :: The leading desktop operating system continues to improve, adding refinements, tool updates, new visuals, and more control over updates. Full Article
microsoft windows Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues By packetstormsecurity.com Published On :: Wed, 06 Jun 2018 20:22:22 GMT scrrun.dll on Microsoft Windows 10 suffers from file creation, folder creation, and folder deletion vulnerabilities. Full Article
microsoft windows Microsoft Windows 98/ME/2000/XP/2003 HTML Help File Hijack By packetstormsecurity.com Published On :: Fri, 05 Jul 2013 09:22:22 GMT Multiple Microsoft Windows 98/ME/2000/XP/2003 HTML Help file loading hijack vulnerabilities exist. Proof of concept included. Full Article
microsoft windows Microsoft Windows WizardOpium Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 06 Mar 2020 13:02:22 GMT Microsoft Windows WizardOpium local privilege escalation exploit. Full Article
microsoft windows CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 13:33:36 GMT CoronaBlue aka SMBGhost proof of concept exploit for Microsoft Windows 10 (1903/1909) SMB version 3.1.1. This script connects to the target host, and compresses the authentication request with a bad offset field set in the transformation header, causing the decompresser to buffer overflow and crash the target. Full Article
microsoft windows Microsoft Windows SMB 3.1.1 Remote Code Execution By packetstormsecurity.com Published On :: Sun, 15 Mar 2020 13:39:33 GMT Microsoft Windows SMB version 3.1.1 suffers from a code execution vulnerability. Full Article
microsoft windows Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:38:04 GMT Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit. Full Article
microsoft windows Microsoft Windows Net Use Insufficent Authentication By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:08:47 GMT The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present. Full Article
microsoft windows Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:42:48 GMT Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges. Full Article
microsoft windows Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:44:19 GMT In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks. Full Article
microsoft windows Microsoft Windows Unquoted Service Path Privilege Escalation By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 20:01:59 GMT This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of them. To some software developers, this is an unexpected behavior, which becomes a security problem if an attacker is able to place a malicious executable in one of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the same problem. Full Article
microsoft windows Microsoft Windows NtUserSetWindowFNID Win32k User Callback By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:32:16 GMT An elevation of privilege vulnerability exists in Microsoft Windows when the Win32k component fails to properly handle objects in memory. This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This Metasploit module is tested against Windows 10 v1703 x86. Full Article
microsoft windows Microsoft Windows 7 Build 7601 (x86) Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 26 Jul 2019 03:22:22 GMT Microsoft Windows 7 Build 7601 (x86) local privilege escalation exploit. Full Article
microsoft windows Microsoft Windows Internet Settings Security Feature Bypass By packetstormsecurity.com Published On :: Tue, 17 Sep 2019 16:50:38 GMT Microsoft Windows suffers from an Internet Settings misconfiguration security feature bypass vulnerability. Versions affected include Windows 7 SP1, 8.0, 8.1 x86 and x64 with full patches up to July 2019. Full Article
microsoft windows Microsoft Windows 7 (x86) BlueKeep RDP Use-After-Free By packetstormsecurity.com Published On :: Tue, 19 Nov 2019 15:05:11 GMT Microsoft Windows 7 (x86) BlueKeep remote desktop protocol windows kernel use-after-free exploit. Full Article
microsoft windows Microsoft Windows 7 Screen Lock Shellcode By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:02:06 GMT 9 bytes small Microsoft Windows 7 screen locking shellcode. Full Article
microsoft windows Microsoft Windows NtUserMNDragOver Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:05:13 GMT This Metasploit module exploits a NULL pointer dereference vulnerability in MNGetpItemFromIndex(), which is reachable via a NtUserMNDragOver() system call. The NULL pointer dereference occurs because the xxxMNFindWindowFromPoint() function does not effectively check the validity of the tagPOPUPMENU objects it processes before passing them on to MNGetpItemFromIndex(), where the NULL pointer dereference will occur. This module has been tested against Windows 7 x86 SP0 and SP1. Offsets within the solution may need to be adjusted to work with other versions of Windows, such as Windows Server 2008. Full Article
microsoft windows Microsoft Windows Firewall Disabling Shellcode By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 23:02:22 GMT 644 bytes small Microsoft Windows x86 shellcode that disables the Windows firewall, adds the user MajinBuu with password TurnU2C@ndy!! to the system, adds the user MajinBuu to the local groups Administrators and Remote Desktop Users, and then enables the RDP Service. Full Article
microsoft windows Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:11:57 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (CmResourceTypeDevicePrivate entries). Full Article
microsoft windows Microsoft Windows Kernel REG_RESOURCE_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:13:09 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_LIST registry values (videoprt.sys descriptors). Full Article
microsoft windows Microsoft Windows Kernel REG_RESOURCE_REQUIREMENTS_LIST Memory Disclosure By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:14:27 GMT The Microsoft Windows kernel suffers from a 64-bit pool memory disclosure vulnerability via REG_RESOURCE_REQUIREMENTS_LIST registry values. Full Article
microsoft windows Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:22:57 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry arbitrary file read / write privilege escalation vulnerability. Full Article
microsoft windows Microsoft Windows Desktop Bridge Privilege Escalation By packetstormsecurity.com Published On :: Wed, 21 Mar 2018 02:24:41 GMT Microsoft Windows suffers from a Desktop Bridge Virtual Registry NtLoadKey arbitrary file read / write privilege escalation vulnerability. Full Article
microsoft windows Microsoft Windows Desktop Bridge Virtual Registry Incomplete Fix By packetstormsecurity.com Published On :: Wed, 20 Jun 2018 00:01:00 GMT The handling of the virtual registry for desktop bridge applications can allow an application to create arbitrary files as system resulting in privilege escalation. This is because the fix for CVE-2018-0880 (MSRC case 42755) did not cover all similar cases which were reported at the same time in the issue. Full Article
microsoft windows Microsoft Windows 10 UAC Bypass By computerDefault By packetstormsecurity.com Published On :: Mon, 22 Oct 2018 01:11:11 GMT This exploit permits an attacker to bypass UAC by hijacking a registry key during computerSecurity.exe (auto elevate windows binary) execution. Full Article
microsoft windows Microsoft Windows 10 User Sessions Stuck By packetstormsecurity.com Published On :: Tue, 30 Oct 2018 10:11:11 GMT This exploit modifies a windows language registry key which causes some windows binaries to stick, including login which makes the session unusable. The key is in HKCU and can be modified without admin rights, but with a bypass UAC, all user sessions can be paralyzed by using reg.exe and user's NTUSER.DAT. Full Article
microsoft windows Microsoft Windows .Reg File / Dialog Box Message Spoofing By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 23:02:22 GMT The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to an end user. This can potentially trick unsavvy users into choosing the wrong selection shown on the dialog box. Furthermore, we can deny the registry editor its ability to show the default secondary status dialog box (Win 10), thereby hiding the fact that our attack was successful. Full Article
microsoft windows Microsoft Windows CmKeyBodyRemapToVirtualForEnum Arbitrary Key Enumeration By packetstormsecurity.com Published On :: Tue, 21 May 2019 23:00:00 GMT The Microsoft Windows kernel's Registry Virtualization does not safely open the real key for a virtualization location leading to enumerating arbitrary keys resulting in privilege escalation. Full Article
microsoft windows Microsoft Windows Kernel Privilege Escalation By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 23:02:22 GMT This vulnerability allows local attackers to escalate privileges on affected installations of Microsoft Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Tracing functionality used by the Routing and Remote Access service. The issue results from the lack of proper permissions on registry keys that control this functionality. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. Full Article
microsoft windows Microsoft Windows OpenType CFF Driver Stack Overflow By packetstormsecurity.com Published On :: Fri, 15 Apr 2011 14:28:37 GMT The VUPEN Vulnerability Research Team discovered a critical vulnerability in Microsoft Windows. The vulnerability is caused by a stack overflow error in the OpenType Compact Font Format (CFF) driver "ATMFD.dll" when processing certain operands within an OpenType font, which could be exploited by remote attackers to execute arbitrary code on a vulnerable Windows 7, Windows Server 2008, Windows Server 2008 R2, and Windows Vista systems via a malicious font, or by local attackers to gain elevated privileges on Windows XP and Windows Server 2003 systems via a malicious application. Full Article
microsoft windows Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service By packetstormsecurity.com Published On :: Wed, 18 May 2011 09:09:09 GMT Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit. Full Article
microsoft windows MS14-060 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Sat, 18 Oct 2014 00:42:31 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. Full Article
microsoft windows MS14-064 Microsoft Windows OLE Package Manager Code Execution By packetstormsecurity.com Published On :: Thu, 13 Nov 2014 17:32:46 GMT This Metasploit module exploits a vulnerability found in Windows Object Linking and Embedding (OLE) allowing arbitrary code execution, publicly exploited in the wild as MS14-060 patch bypass. The Microsoft update tried to fix the vulnerability publicly known as "Sandworm". Platforms such as Windows Vista SP2 all the way to Windows 8, Windows Server 2008 and 2012 are known to be vulnerable. However, based on our testing, the most reliable setup is on Windows platforms running Office 2013 and Office 2010 SP2. And please keep in mind that some other setups such as using Office 2010 SP1 might be less stable, and sometimes may end up with a crash due to a failure in the CPackage::CreateTempFileName function. Full Article