exploit the possibilities
Showing 1 - 13 of 13 RSS Feed

Files from Stephen de Vries

Email addressstephen.de.vries at corsaire.com
First Active2003-08-13
Last Active2007-01-14
corsaire-chainkey.txt
Posted Jan 14, 2007
Authored by Stephen de Vries | Site corsaire.com

Corsaire Security Advisory - The aim of this document is to clearly define an issue that exists with the ChainKey Java Code Protection product, that will allow an attacker to circumvent the encryption protection and de-compile any protected Java application.

tags | advisory, java
advisories | CVE-2007-0014
MD5 | a947f900a295b970a1717f7650f7279b
beanshell.pdf
Posted Aug 27, 2006
Authored by Stephen de Vries | Site corsaire.com

Accessing Java Clients with the BeanShell. This whitepaper goes into detail discussing the assessment of Java applications utilizing the BeanShell.

tags | paper, java
MD5 | 86f5a728c7199f4f03af12a0402c9eac
Corsaire Security Advisory 2006-05-12.1
Posted Aug 17, 2006
Authored by Stephen de Vries, Corsaire

Corsaire Security Advisory - The VMware ESX Server product will allow a local attacker to gain access to users' (including root's) passwords under certain conditions via a cookie issue.

tags | advisory, local, root
advisories | CVE-2006-2481
MD5 | 8ae411a5eeb8a8178427729f1472b53d
Corsaire Security Advisory 2005-11-14.3
Posted Aug 17, 2006
Authored by Stephen de Vries, Corsaire

Corsaire Security Advisory - The VMware ESX Server product will allow a local attacker to read users' (including root's) passwords under certain conditions.

tags | advisory, local, root
advisories | CVE-2005-3620
MD5 | f313bf44df34ab80460c041e8be230d4
Corsaire Security Advisory 2005-11-14.1
Posted Aug 17, 2006
Authored by Stephen de Vries, Corsaire

Corsaire Security Advisory - The VMware ESX Server product will allow a remote attacker to set arbitrary passwords for users under certain conditions.

tags | advisory, remote, arbitrary
advisories | CVE-2005-3618
MD5 | 0824b767d0e492cb5f8143124d58dfc1
vmwareXSS.txt
Posted Jun 5, 2006
Authored by Stephen de Vries

VMware ESX server versions prior to 2.5.2 upgrade patch 2, prior to 2.1.2 upgrade patch 6, and prior to 2.0.1 upgrade patch 6 suffer from a cross site scripting issue.

tags | advisory, xss
advisories | CVE-2005-3619
MD5 | 9299a8b2678099c57c8f9844c027288b
A_Modular_Approach_to_Data_Validation_v1.0.pdf
Posted Apr 12, 2006
Authored by Stephen de Vries | Site corsaire.com

This paper presents a modular approach to performing thorough data validation in modern web applications so that the benefits of modular component based design; extensibility, portability and re-use can be released. The paper begins with an explanation of the vulnerabilities introduced through poor validation and then goes on to discuss the merits of a number of common data validation methodologies. A modular approach is introduced together with practical examples of how to implement such a scheme in a web application. It also provides information on common attack vectors, principles of validation, a modular solution and implementation of that solution.

tags | paper, web, vulnerability
MD5 | a0b2f3ac1b5d56c1eb5b580c14a11f16
050819-securing-mac-os-x-tiger.pdf
Posted Aug 26, 2005
Authored by Stephen de Vries | Site corsaire.com

Corsaire (www.corsaire.com/white-papers/) has released a fully updated version of their guide to securing Mac OS X to cover the new security features offered by Mac OS X 10.4 Tiger (such as ACLs) as well as incorporating additional security guidelines that were omitted in the original (10.3) guide.

systems | apple, osx
MD5 | 021cca9d23a8be3656a5f08e6bc300ec
Corsaire Security Advisory 2004-08-17.3
Posted Mar 1, 2005
Authored by Stephen de Vries, Corsaire | Site penetration-testing.com

Corsaire Security Advisory - The aim of this document is to define a vulnerability in the 3300 Integrated Communication Platform as supplied by Mitel, that allows an authenticated user to deny access to other users of the web management interface.

tags | advisory, web
advisories | CVE-2004-0944
MD5 | 42fe0fe7d3ab00c9ae0aba4f8ed9e054
Corsaire Security Advisory 2004-08-17.2
Posted Mar 1, 2005
Authored by Stephen de Vries, Corsaire | Site penetration-testing.com

Corsaire Security Advisory - The aim of this document is to define a vulnerability in the 3300 Integrated Communication Platform as supplied by Mitel, that allows a remote attacker to hijack legitimate users' web management sessions.

tags | advisory, remote, web
advisories | CVE-2004-0944
MD5 | 83c953b7c660de3bf8e13268ff4692bf
Corsaire Security Advisory 2004-07-20.1
Posted Nov 20, 2004
Authored by Stephen de Vries, Corsaire | Site penetration-testing.com

Corsaire Security Advisory - The aim of this document is to define a vulnerability in the Netopia Timbuktu 7.0.3 product for Mac OS X that suffers from a buffer overflow.

tags | advisory, overflow
systems | apple, osx
advisories | CVE-2004-0810
MD5 | 1444e99d41aca0d1fe6e55cfef2f2a69
ApplicationLevelDoSAttacksv06.pdf
Posted May 20, 2004
Authored by Stephen de Vries | Site corsaire.com

Corsaire White Paper: Application Level Denial Of Service Attacks. Discusses root causes, attack vectors, classes, and more.

tags | paper, denial of service, root
MD5 | 3cfdfceff8ebbe00d928e4b91a4004e8
multimap.pl
Posted Aug 13, 2003
Authored by Stephen de Vries | Site omega.arcbox.com

Multimap is a multithreaded wrapper for nmap designed to run a number of concurrent nmap scans and speed up the scan of large networks. Optionally it will launch amap on the open ports and generate an HTML file of the results. Tested with nmap 3.27, 3.30 and amap 4.2.

systems | unix
MD5 | 9ff4ebedcfb351530faa54e3553e7980
Page 1 of 1
Back1Next

File Archive:

May 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    1 Files
  • 2
    May 2nd
    4 Files
  • 3
    May 3rd
    27 Files
  • 4
    May 4th
    17 Files
  • 5
    May 5th
    3 Files
  • 6
    May 6th
    32 Files
  • 7
    May 7th
    11 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close