soft

[Softball] Tigers take home two wins.

Lawrence, KS – The Haskell Softball team were on the road to McPherson, Kansas to face Central Christian College for a double-header. Haskell would struggle the first game but battle back to make the second game close.




soft

[Softball] Evangels sweep the Indians.

Lawrence, KS – The Haskell Softball team heads to Oklahoma for two double-headers against Mid-America Christian University and Langston University. These two games were scheduled to be played in February but were postponed due to weather conditions.




soft

[Softball] Lions sweep the Indians

Lawrence, KS – The Haskell Softball team heads to Oklahoma for two double-headers against Mid-America Christian University and Langston University. These two games were scheduled to be played in February but were postponed due to weather conditions.




soft

[Softball] Indians continue to struggle on the road.

Lawrence, KS – The Haskell Softball team was on the road to Marshall, Missouri for a double-header against Missouri Valley College.




soft

[Softball] Graceland University takes home two wins.

Lawrence, KS – The Haskell Softball team hosted Graceland University for a double-header on Monday afternoon.




soft

[Softball] Softball Opens Up Their Season on Monday, February 3rd




soft

[Softball] Softball Game Against Ottawa University Postponed




soft

[Softball] Haskell's Open Opener on Thursday 2/13/20 Postponed Due to Impending Inclement Weather.




soft

[Softball] Softball Game Against Clarke University Postponed




soft

[Softball] Langston University Softball Defeats Haskell




soft

[Softball] Softball Falls Short on the Road




soft

[Softball] Softball Double Header on the Road Postponed




soft

[Softball] Softball Falls to Southwestern College in Double Header




soft

[Softball] Haskell Softball Takes Home Two Wins During First Day in SC!




soft

[Softball] Three Haskell Softball Athletes Awarded A.I.I. Team Honors!




soft

Computational Software: A New Paradigm for EDA Tools

Cadence has a new white paper out on Computational Software . I've written on these topics in Breakfast Bytes, most recently in the posts: Computational Software System Analysis: Computational...

[[ Click on the title to access the full blog on the Cadence Community site. ]]





soft

Microsoft Windows 10 scrrun.dll Active-X Creation / Deletion Issues

scrrun.dll on Microsoft Windows 10 suffers from file creation, folder creation, and folder deletion vulnerabilities.





soft

Microsoft To Fix IE8 Cross-Site Scripting Problem, Again




soft

Serious XSS Flaw Haunts Microsoft SharePoint





soft

Dassault Systèmes Reports First Quarter Financial Results With Recurring Software, Operating Margin and EPS At the High End of Its Non-IFRS Guidance

Dassault Systèmes Reports First Quarter Financial Results With Recurring Software, Operating Margin and EPS At the High End of Its Non-IFRS Guidance




soft

Wii Hacked, Runs Homebrew Software




soft

Wii Hack Simulates Microsoft Surface




soft

typsoft110.txt

TYPSoft FTP Server 1.10 for Windows 9X and WinNT is vulnerable to a denial of service attack when a blank username is supplied.




soft

Microsoft Windows 98/ME/2000/XP/2003 HTML Help File Hijack

Multiple Microsoft Windows 98/ME/2000/XP/2003 HTML Help file loading hijack vulnerabilities exist. Proof of concept included.




soft

Chinese Skype Software Secretly Logs Political Chat Messages





soft

Microsoft Windows WizardOpium Local Privilege Escalation

Microsoft Windows WizardOpium local privilege escalation exploit.




soft

CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept

CoronaBlue aka SMBGhost proof of concept exploit for Microsoft Windows 10 (1903/1909) SMB version 3.1.1. This script connects to the target host, and compresses the authentication request with a bad offset field set in the transformation header, causing the decompresser to buffer overflow and crash the target.




soft

Microsoft Windows SMB 3.1.1 Remote Code Execution

Microsoft Windows SMB version 3.1.1 suffers from a code execution vulnerability.




soft

Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation

Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit.




soft

Microsoft Windows Net Use Insufficent Authentication

The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present.




soft

Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation

Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges.




soft

Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation

In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks.




soft

Microsoft Windows Unquoted Service Path Privilege Escalation

This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of them. To some software developers, this is an unexpected behavior, which becomes a security problem if an attacker is able to place a malicious executable in one of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the same problem.









soft

Microsoft Taps Eric Holder To Audit AnyVision Face Recognition





soft

Microsoft Warns Of Hacking Group Targeting Vulnerable Web Servers