exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 13 of 13 RSS Feed

Files from Stephen de Vries

Email addressstephen.de.vries at corsaire.com
First Active2003-08-13
Last Active2007-01-14
corsaire-chainkey.txt
Posted Jan 14, 2007
Authored by Stephen de Vries | Site corsaire.com

Corsaire Security Advisory - The aim of this document is to clearly define an issue that exists with the ChainKey Java Code Protection product, that will allow an attacker to circumvent the encryption protection and de-compile any protected Java application.

tags | advisory, java
advisories | CVE-2007-0014
SHA-256 | 507876689ae809c61bbd55e5605025bf397f044485c22295d1991e697e006a78
beanshell.pdf
Posted Aug 27, 2006
Authored by Stephen de Vries | Site corsaire.com

Accessing Java Clients with the BeanShell. This whitepaper goes into detail discussing the assessment of Java applications utilizing the BeanShell.

tags | paper, java
SHA-256 | d88b3a4015272cba9306c073c84c23f81966ed4e83fa15e3f4ca6721bd9b240e
Corsaire Security Advisory 2006-05-12.1
Posted Aug 17, 2006
Authored by Stephen de Vries, Corsaire

Corsaire Security Advisory - The VMware ESX Server product will allow a local attacker to gain access to users' (including root's) passwords under certain conditions via a cookie issue.

tags | advisory, local, root
advisories | CVE-2006-2481
SHA-256 | 7d94b30ef247c8df7d87e8885665988e245aa6bdd92034fae2049c0c90a4cc46
Corsaire Security Advisory 2005-11-14.3
Posted Aug 17, 2006
Authored by Stephen de Vries, Corsaire

Corsaire Security Advisory - The VMware ESX Server product will allow a local attacker to read users' (including root's) passwords under certain conditions.

tags | advisory, local, root
advisories | CVE-2005-3620
SHA-256 | 0496ab765de22a5820ee6012fc38444603ee124876d472340221a100c0ffa212
Corsaire Security Advisory 2005-11-14.1
Posted Aug 17, 2006
Authored by Stephen de Vries, Corsaire

Corsaire Security Advisory - The VMware ESX Server product will allow a remote attacker to set arbitrary passwords for users under certain conditions.

tags | advisory, remote, arbitrary
advisories | CVE-2005-3618
SHA-256 | ce767781800241562f4b89adcec9e7065422afca428c1e9f89e007b48ae77c10
vmwareXSS.txt
Posted Jun 5, 2006
Authored by Stephen de Vries

VMware ESX server versions prior to 2.5.2 upgrade patch 2, prior to 2.1.2 upgrade patch 6, and prior to 2.0.1 upgrade patch 6 suffer from a cross site scripting issue.

tags | advisory, xss
advisories | CVE-2005-3619
SHA-256 | a34796941c3f2d47f3efc4621f3a3bf1f5ee34cf260af386d81d550d414dd84c
A_Modular_Approach_to_Data_Validation_v1.0.pdf
Posted Apr 12, 2006
Authored by Stephen de Vries | Site corsaire.com

This paper presents a modular approach to performing thorough data validation in modern web applications so that the benefits of modular component based design; extensibility, portability and re-use can be released. The paper begins with an explanation of the vulnerabilities introduced through poor validation and then goes on to discuss the merits of a number of common data validation methodologies. A modular approach is introduced together with practical examples of how to implement such a scheme in a web application. It also provides information on common attack vectors, principles of validation, a modular solution and implementation of that solution.

tags | paper, web, vulnerability
SHA-256 | d6ea21e85a8e50b5eb5abc46932d07593292a7f8f5443ced84aadf093a2415ae
050819-securing-mac-os-x-tiger.pdf
Posted Aug 26, 2005
Authored by Stephen de Vries | Site corsaire.com

Corsaire (www.corsaire.com/white-papers/) has released a fully updated version of their guide to securing Mac OS X to cover the new security features offered by Mac OS X 10.4 Tiger (such as ACLs) as well as incorporating additional security guidelines that were omitted in the original (10.3) guide.

systems | apple, osx
SHA-256 | 1ea81aaa2aa236628ac103090c6ba94ca9fabfeb20d246d321c0a91cc7b54d51
Corsaire Security Advisory 2004-08-17.3
Posted Mar 1, 2005
Authored by Stephen de Vries, Corsaire | Site penetration-testing.com

Corsaire Security Advisory - The aim of this document is to define a vulnerability in the 3300 Integrated Communication Platform as supplied by Mitel, that allows an authenticated user to deny access to other users of the web management interface.

tags | advisory, web
advisories | CVE-2004-0944
SHA-256 | 975e7ff38467f1f73f0361754991c5f6a3c6b8613b59d5b5570edc6342651883
Corsaire Security Advisory 2004-08-17.2
Posted Mar 1, 2005
Authored by Stephen de Vries, Corsaire | Site penetration-testing.com

Corsaire Security Advisory - The aim of this document is to define a vulnerability in the 3300 Integrated Communication Platform as supplied by Mitel, that allows a remote attacker to hijack legitimate users' web management sessions.

tags | advisory, remote, web
advisories | CVE-2004-0944
SHA-256 | 115de7ef495ee50d9d76e6880e5af65008e64ba19a3af0d399223d9479b4c5ba
Corsaire Security Advisory 2004-07-20.1
Posted Nov 20, 2004
Authored by Stephen de Vries, Corsaire | Site penetration-testing.com

Corsaire Security Advisory - The aim of this document is to define a vulnerability in the Netopia Timbuktu 7.0.3 product for Mac OS X that suffers from a buffer overflow.

tags | advisory, overflow
systems | apple, osx
advisories | CVE-2004-0810
SHA-256 | cbc907a49668c0fcf9a73b904dee166db917a6d624962997421a44440286d2ae
ApplicationLevelDoSAttacksv06.pdf
Posted May 20, 2004
Authored by Stephen de Vries | Site corsaire.com

Corsaire White Paper: Application Level Denial Of Service Attacks. Discusses root causes, attack vectors, classes, and more.

tags | paper, denial of service, root
SHA-256 | 5e4c9099a231ecfabd4b740e6dcffeff73ed68e94a394a89fdac42d9e21b41bf
multimap.pl
Posted Aug 13, 2003
Authored by Stephen de Vries | Site omega.arcbox.com

Multimap is a multithreaded wrapper for nmap designed to run a number of concurrent nmap scans and speed up the scan of large networks. Optionally it will launch amap on the open ports and generate an HTML file of the results. Tested with nmap 3.27, 3.30 and amap 4.2.

systems | unix
SHA-256 | ebc5b68e699ee6a3b460975e89a6c51d435ea997da9bce70b118d29a9b3d81f1
Page 1 of 1
Back1Next

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close