![eviews 10 hacked eviews 10 hacked](https://rarpc.co/wp-content/uploads/2021/09/EViews-9-Crack-Enterprise-Edition-210x150.jpg)
Sunjoo Park (aka grigoritchy) and RET2 Systems' Jack Dates escaped Parallels Desktop and executed code on the underlying operating system, which earned them $40,000 each. They earned $200,000 by gaining code execution on the targeted machine using a zero-click exploit chain combining three different bugs. Zoom Messenger was also hacked by Computest's Daan Keuper and Thijs Alkemade. On the second day, Dataflow Security's Bruno Keith and Niklas Baumstark also earned $100,000 after exploiting the renderer in the Google Chrome and the Chromium-based Microsoft Edge web browsers using a Type Mismatch bug. Still, their entry was considered partially successful given that some of the bugs they used were previously reported on the first day of the competition by the Devcore team. Team Viettel also demoed a code execution exploit chain on a Microsoft Exchange Server on the second day.
![eviews 10 hacked eviews 10 hacked](https://images-na.ssl-images-amazon.com/images/I/410nISNPJlL._SX335_BO1,204,203,200_.jpg)
Microsoft's OS was hacked a third time during day one of Pwn2Own by Team Viettel, who escalated a regular user's privileges to SYSTEM using another previously unknown integer overflow bug. This also brought them $40,000 after escalating privileges from a regular (non-privileged) user.
#Eviews 10 hacked windows 10
Windows 10 was hacked a second time using an undocumented integer overflow weakness to escalate permissions up to NT Authority\SYSTEM by a researcher known as z3r09. The first to demo a successful Windows 10 exploit on Wednesday and earn $40,000 was Palo Alto Networks' Tao Yan who used a Race Condition bug to escalate to SYSTEM privileges from a normal user on a fully patched Windows 10 machine. Contestants hacked Microsoft's Windows 10 OS twice during the second day of the Pwn2Own 2021 competition, together with the Google Chrome web browser and the Zoom video communication platform.