James Fitts

69 exploits Active since Sep 2005
EIP-2026-118726 EXPLOITDB ruby WORKING POC
Lockstep Backup for Workgroups 4.0.3 - Remote Buffer Overflow (Metasploit)
EIP-2026-118923 EXPLOITDB ruby WORKING POC
Motorola Netopia Netoctopus SDCS - Remote Stack Buffer Overflow (Metasploit)
CVE-2014-0787 EXPLOITDB ruby WORKING POC
Wellintech Kingscada < 3.1.2 - Memory Corruption
Stack-based buffer overflow in WellinTech KingSCADA before 3.1.2.13 allows remote attackers to execute arbitrary code via a crafted packet.
EIP-2026-118512 EXPLOITDB ruby WORKING POC
EMC AlphaStor Device Manager - Opcode 0x72 Buffer Overflow (Metasploit)
EIP-2026-118373 EXPLOITDB ruby WORKING POC
Cloudview NMS 2.00b - Writable Directory Traversal Execution (Metasploit)
EIP-2026-118374 EXPLOITDB ruby WORKING POC
Cloudview NMS < 2.00b - Arbitrary File Upload (Metasploit)
CVE-2005-2842 EXPLOITDB ruby WORKING POC
DameWare Mini Remote Control <4.9.0 - RCE
Buffer overflow in dwrcs.exe in DameWare Mini Remote Control before 4.9.0 allows remote attackers to execute arbitrary code via the username.
EIP-2026-118413 EXPLOITDB ruby WORKING POC
Disk Pulse Server 2.2.34 - 'GetServerInfo' Remote Buffer Overflow (Metasploit)
CVE-2013-0946 EXPLOITDB ruby WORKING POC
EMC AlphaStor 4.0 <build 910 - Buffer Overflow
Buffer overflow in the Library Control Program (LCP) in EMC AlphaStor 4.0 before build 910 allows remote attackers to execute arbitrary code via crafted commands.
CVE-2016-8377 EXPLOITDB HIGH ruby WORKING POC
Fatek Automation PLC WinProladder <3.11 Build 14701 - Buffer Overflow
An issue was discovered in Fatek Automation PLC WinProladder Version 3.11 Build 14701. A stack-based buffer overflow vulnerability exists when the software application connects to a malicious server, resulting in a stack buffer overflow. This causes an exploitable Structured Exception Handler (SEH) overwrite condition that may allow remote code execution.
CVSS 8.0
EIP-2026-118560 EXPLOITDB ruby WORKING POC
Freefloat FTP Server - 'MKD' Remote Buffer Overflow (Metasploit)
EIP-2026-118567 EXPLOITDB ruby WORKING POC
Freefloat FTP Server - Remote Buffer Overflow (Metasploit)
EIP-2026-118630 EXPLOITDB ruby WORKING POC
haneWIN DNS Server 1.5.3 - Remote Buffer Overflow (Metasploit)
CVE-2011-0340 EXPLOITDB ruby WORKING POC
Advantech Studio < 7.0 - Memory Corruption
Multiple buffer overflows in the ISSymbol ActiveX control in ISSymbol.ocx 61.6.0.0 and 301.1009.2904.0 in the ISSymbol virtual machine, as distributed in Advantech Studio 6.1 SP6 61.6.01.05, InduSoft Web Studio before 7.0+SP1, and InduSoft Thin Client 7.0, allow remote attackers to execute arbitrary code via a long (1) InternationalOrder, (2) InternationalSeparator, or (3) LogFileName property value; or (4) a long bstrFileName argument to the OpenScreen method.
EIP-2026-117913 EXPLOITDB ruby WORKING POC
SnackAmp 3.1.2 - SMP Buffer Overflow (SEH)
EIP-2026-118165 EXPLOITDB ruby WORKING POC
Wordtrainer 3.0 - '.ord' Local Buffer Overflow (Metasploit)
EIP-2026-118162 EXPLOITDB ruby WORKING POC
Word List Builder 1.0 - Local Buffer Overflow (Metasploit)
EIP-2026-117915 EXPLOITDB ruby WORKING POC
SnackAmp 3.1.3B - SMP Buffer Overflow (SEH)
EIP-2026-117914 EXPLOITDB ruby WORKING POC
SnackAmp 3.1.3 - SMP Buffer Overflow (SEH)
CVE-2010-5299 EXPLOITDB ruby WORKING POC
MicroP 0.1.1.1600 - Buffer Overflow
Stack-based buffer overflow in MicroP 0.1.1.1600 allows remote attackers to execute arbitrary code via a crafted .mppl file. NOTE: it has been reported that the overflow is in the lpFileName parameter of the CreateFileA function, but the overflow is probably caused by a separate, unnamed function.
EIP-2026-117646 EXPLOITDB ruby WORKING POC
MPlayer - '.SAMI' Subtitle File Buffer Overflow (DEP Bypass) (Metasploit)
CVE-2010-5081 EXPLOITDB ruby WORKING POC
Mini-Stream RM-MP3 Converter 3.1.2.1 - Buffer Overflow
Stack-based buffer overflow in Mini-Stream RM-MP3 Converter 3.1.2.1 allows remote attackers to execute arbitrary code via a long URL in a .pls file.
CVE-2010-5299 EXPLOITDB ruby WORKING POC
MicroP 0.1.1.1600 - Buffer Overflow
Stack-based buffer overflow in MicroP 0.1.1.1600 allows remote attackers to execute arbitrary code via a crafted .mppl file. NOTE: it has been reported that the overflow is in the lpFileName parameter of the CreateFileA function, but the overflow is probably caused by a separate, unnamed function.
EIP-2026-117161 EXPLOITDB ruby WORKING POC
Fat Player Media Player 0.6b0 - Local Buffer Overflow (Metasploit)
EIP-2026-117198 EXPLOITDB ruby WORKING POC
FreeAmp 2.0.7 - '.fat' Local Buffer Overflow (Metasploit)