exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 113 RSS Feed

Files from Yorick Koster

Real NameYorick Koster
Email addressprivate
Websitenl.linkedin.com/in/yorickkoster
First Active2009-07-17
Last Active2024-08-31
View User Profile
Office OLE DLL Hijacking
Posted Nov 10, 2016
Authored by Yorick Koster | Site metasploit.com

Multiple DLL side loading vulnerabilities were found in various COM components. These issues can be exploited by loading various these components as an embedded OLE object. When instantiating a vulnerable object Windows will try to load one or more DLLs from the current working directory. If an attacker convinces the victim to open a specially crafted (Office) document from a directory also containing the attacker's DLL file, it is possible to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system.

tags | exploit, arbitrary, vulnerability
systems | windows
advisories | CVE-2015-6128, CVE-2015-6132, CVE-2015-6133, CVE-2016-0041, CVE-2016-0100, CVE-2016-3235
SHA-256 | 54a85ca989c4eaff178f934a3bf1f889b5563dba98e78c59197f8309e65b7406
WordPress Quotes Collection 2.0.5 Cross Site Scripting
Posted Nov 8, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Quotes Collection plugin version 2.0.5 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3e714101167947eb893acf037ef84d9ed96b9fc784119af58b4e11c5506a768a
WordPress YITH WooCommerce Compare 2.0.9 PHP Object Injection
Posted Nov 8, 2016
Authored by Yorick Koster, Securify B.V.

WordPress YITH WooCommerce Compare plugin version 2.0.9 suffers from a PHP object injection vulnerability.

tags | exploit, php
SHA-256 | 0db04c264f42b23b55cb4613767ded49fab18d10ff1bb03155469fb2bb5d9b85
WordPress 4.5.3 Core Ajax Handlers Path Traversal
Posted Aug 22, 2016
Authored by Yorick Koster, Securify B.V.

WordPress version 4.5.3 suffers from a path traversal vulnerability in the core ajax handlers.

tags | exploit, file inclusion
SHA-256 | 78a9e8298d6dbe41d508c8f450f6b57d41e9ba8bdefa0dd06867e661676810ca
WordPress Peter's Login Redirect 2.9.0 XSS / CSRF
Posted Aug 15, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Peter's Login Redirect plugin version 2.9.0 suffers from cross site scripting and cross site request forgery vulnerabilities.

tags | exploit, vulnerability, xss, csrf
SHA-256 | d923d75814f53455678a49a2ea9a573214a261b554bc26017e3d32911f08e0ae
DLL Side Loading In VMware Host Guest Client Redirector
Posted Aug 11, 2016
Authored by Yorick Koster | Site metasploit.com

A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector, a component of VMware Tools. This issue can be exploited by luring a victim into opening a document from the attacker's share. An attacker can exploit this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet.

tags | exploit, arbitrary
advisories | CVE-2016-5330
SHA-256 | 77b0507ce09c87acf67f7f51e1ec6e8edf574e2564f337de61f2167599efd712
Microsoft Internet Explorer Local File Name Disclosure
Posted Aug 9, 2016
Authored by Yorick Koster, Securify B.V.

Microsoft Internet Explorer suffers from an iframe sandbox local file name disclosure vulnerability.

tags | advisory, local, info disclosure
advisories | CVE-2016-3321
SHA-256 | c9e6501898d6e4e506e28508a7c9fcb53f7ac24f8c867ab0e2dad6adc79d96b5
WordPress Ecwid Ecommerce Shopping Cart 4.4 / 4.4.3 PHP Object Injection
Posted Aug 6, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Ecwid Ecommerce Shopping Cart plugin versions 4.4 and 4.4.3 suffer from a PHP object injection vulnerability.

tags | advisory, php
SHA-256 | eea5dc338145f133ef2c948a11161b48b9195ae993992148222504ead33426e2
WordPress Store Locator Plus 4.5.09 Cross Site Scripting
Posted Aug 6, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Store Locator Plus plugin version 4.5.09 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 43b65d3af62ae6aa76f632546f4154184dffe47668db8ba7c2c6611719d67b43
VMware Host Guest Client Redirector DLL Hijacking
Posted Aug 6, 2016
Authored by Yorick Koster, Securify B.V.

A DLL side loading vulnerability was found in the VMware Host Guest Client Redirector, a component of VMware Tools. This issue can be exploited by luring a victim into opening a document from the attacker's share. An attacker can exploit this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet.

tags | advisory, arbitrary
systems | windows
SHA-256 | a9ebf159096d5d370785b483c89286e459f55701477990b573fb428d268cfcc8
WordPress Count Per Day 3.5.4 Cross Site Scripting
Posted Aug 4, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Count Per Day plugin version 3.5.4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | d69f6409f9285b4b341d81988998df80a9629b3685c4fee05a3057a084dfc9e1
WordPress Activity Log 2.3.2 Cross Site Scripting
Posted Aug 3, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Activity Log plugin version 2.3.2 suffers from a cross site scripting vulnerability in the administrator functionality.

tags | exploit, xss
SHA-256 | 21667bded8d0d3482c6b534d3ebe3039accf5360a112babf71727c592ae859f9
WordPress WangGuard 1.7.1 Cross Site Scripting
Posted Aug 2, 2016
Authored by Yorick Koster, Securify B.V.

WordPress WangGuard plugin version 1.7.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3051456cf2c889f689308508ff4c2b710884818fc46e3bee93704407dccdf0c6
WordPress Uji Countdown 2.0.6 Cross Site Scripting
Posted Aug 2, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Uji Countdown plugin version 2.0.6 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2eb875254f090d907a59a28a55943e84566f3430544df03b57979f23ad8ced80
WordPress ALO EasyMail Newsletter 2.9.2 Cross Site Request Forgery
Posted Aug 1, 2016
Authored by Yorick Koster, Securify B.V.

WordPress ALO EasyMail Newsletter plugin version 2.9.2 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | ae00196b511cb748d0d23fe742e953b03adfd2422a853721694ecebb3ed4dd8a
WordPress Contact Bank 2.1.21 Cross Site Scripting
Posted Aug 1, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Contact Bank plugin version 2.1.21 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | acbccf7b1d40eb6d4dfb239eb471cc8f3e28e90de4dc1cdfa31b452a903f31fa
WordPress ColorWay 3.4.1 Cross Site Scripting
Posted Jul 27, 2016
Authored by Yorick Koster, Securify B.V.

WordPress ColorWay theme version 3.4.1 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3bcf6e430117f011bfa6bd3a2b25554032fd79f8c9f5f3d375c6a42284fe8437
WordPress Video Player 1.5.16 SQL Injection
Posted Jul 19, 2016
Authored by David Vaartjes, Yorick Koster, Securify B.V.

WordPress Video Player plugin version 1.5.16 suffers from multiple remote SQL injection vulnerabilities.

tags | exploit, remote, vulnerability, sql injection
SHA-256 | e466846931ce435c89ed6a17e672eaf0b4818880fd543e1016bd3f3bc4de6f26
WordPress Icegram 1.9.18 Cross Site Request Forgery
Posted Jul 19, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Icegram plugin version 1.9.18 suffers from a cross site request forgery vulnerability.

tags | exploit, csrf
SHA-256 | 34497fd583aa9c4a2d176e260fdb464996bceb614b526b50b668962c1bc2887a
WordPress Top 10 Popular Posts 2.3.0 Cross Site Scripting
Posted Jul 13, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Top 10 Popular Posts plugin version 2.3.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 2ef13b9046be953e681d2fe0e87def1da4ba275c47d315b48c71767de2390123
WordPress Simple Membership 3.2.8 Cross Site Scripting
Posted Jul 13, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Simple Membership plugin version 3.2.8 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3e8992560e17c27925537a0aace108c6ef22f9b536239abaf910f9e8ea96163e
WordPress WP No External Links 3.5.15 Cross Site Scripting
Posted Jul 13, 2016
Authored by Yorick Koster, Securify B.V.

WordPress WP No External Links plugin version 3.5.15 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 708a16d3086d6d4fbf54c12feb7c24010807b262e8b4085980426fd79cdb8538
WordPress Google Forms 0.84 Cross Site Scripting
Posted Jul 13, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Google Forms plugin version 0.84 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 8fb3153cc86d1f165cf198ec1a8cceeefd1b6e4eae41b148c5f367fda60005dd
WordPress Easy Forms For MailChimp 6.0.5.5 Local File Inclusion
Posted Jul 12, 2016
Authored by Yorick Koster, Securify B.V.

WordPress Easy Forms for MailChimp plugin version 6.0.5.5 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | f9cad639aaef7cf5440fda2fd29535f1cb187e2e5bf1688b5d20fa6b3111e0d5
WordPress WP Fastest Cache 0.8.5.9 Local File Inclusion
Posted Jul 12, 2016
Authored by Yorick Koster, Securify B.V.

WordPress WP Fastest Cache plugin version 0.8.5.9 suffers from a local file inclusion vulnerability.

tags | exploit, local, file inclusion
SHA-256 | 0054cb275ef233d49c094070fb79510dc684f361c4da8889694dc76faaa05c30
Page 3 of 5
Back12345Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close