Exploit the possiblities
Showing 26 - 43 of 43 RSS Feed

Files from James Fitts

First Active2010-08-30
Last Active2017-09-29
ERS Viewer 2013 ERS File Handling Buffer Overflow
Posted Jul 9, 2013
Authored by James Fitts, juan vazquez | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in ERS Viewer 2013. The vulnerability exists in the module ermapper_u.dll, where the function rf_report_error handles user provided data in a insecure way. It results in arbitrary code execution under the context of the user viewing a specially crafted .ers file. This Metasploit module has been tested successfully with ERS Viewer 2013 (versions 13.0.0.1151) on Windows XP SP3 and Windows 7 SP1.

tags | exploit, overflow, arbitrary, code execution
systems | windows, xp, 7
advisories | CVE-2013-3482, OSVDB-93650
MD5 | 353adb4184511741811b4ec14f78a159
InduSoft Web Studio ISSymbol.ocx InternationalSeparator() Heap Overflow
Posted Dec 19, 2012
Authored by James Fitts, Dmitriy Pletnev, Alexander Gavrun, juan vazquez | Site metasploit.com

This Metasploit module exploits a heap overflow found in InduSoft Web Studio <= 61.6.00.00 SP6. The overflow exists in the ISSymbol.ocx, and can be triggered with a long string argument for the InternationalSeparator() method of the ISSymbol control. This Metasploit modules uses the msvcr71.dll form the Java JRE6 to bypass ASLR.

tags | exploit, java, web, overflow
advisories | CVE-2011-0340, OSVDB-72865
MD5 | 2216a012b1449bce904fb4b82548ae89
Sunway Forcecontrol SNMP NetDBServer.exe Opcode 0x57
Posted Feb 3, 2012
Authored by Luigi Auriemma, James Fitts, Rinat Ziyayev | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in the SNMP NetDBServer service of Sunway Forcecontrol <= 6.1 sp3. The overflow is triggered when sending an overly long string to the listening service on port 2001.

tags | exploit, overflow
MD5 | 698866532ad1b54414eac7c2b563cab3
Free MP3 CD Ripper 1.1 (WAV File) Stack Buffer Overflow
Posted Nov 23, 2011
Authored by Richard Leahy, James Fitts, X-h4ck, Tiago Henriques | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in Free MP3 CD Ripper 1.1. The overflow is triggered when an unsuspecting user opens a malicious WAV file.

tags | exploit, overflow
MD5 | ce0f470df96ba3b1d0d6acb50cd98a25
Mini-Stream RM-MP3 Converter 3.1.2.1 Buffer Overflow
Posted Nov 14, 2011
Authored by MadjiX, James Fitts, Tiago Henriques | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in Mini-Stream RM-MP3 Converter version 3.1.2.1. The overflow is triggered when an unsuspecting victim opens the malicious PLS file.

tags | exploit, overflow
MD5 | 847d0e6df8907dfa368b782a1d854dab
Cytel Studio 9.0 (CY3 File) Stack Buffer Overflow
Posted Oct 24, 2011
Authored by Luigi Auriemma, James Fitts | Site metasploit.com

This Metasploit module exploits a stack based buffer overflow found in Cytel Studio <= 9.0. The overflow is triggered during the copying of strings to a stack buffer of 256 bytes.

tags | exploit, overflow
advisories | OSVDB-75991
MD5 | 803c6fca9cba79ef5cd0543f93bb1810
Freeamp 2.0.7 (FAT File) Stack Buffer Overflow
Posted Aug 4, 2011
Authored by James Fitts, Ivan Garcia Ferreira | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in Freeamp 2.0.7. The overflow occurs when an overly long string is parsed in the FAT file. This Metasploit module creates a txt file that has to be used in the creation of a FAT file. The FAT file then has to be imported as a theme. To create the FAT file you need to first decompress the basic theme template, MakeTheme -d freeamp.fat. Next create the new FAT file MakeTheme crash.fat theme.xml title.txt *.bmp.

tags | exploit, overflow
MD5 | 5524eff40523bcdd11fb577a2e668208
ABBS Electronic Flash Cards 2.1 (FCD File) Stack Buffer Overflow
Posted Aug 4, 2011
Authored by James Fitts, h1ch4m | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in ABBS Electronic Flash Cards 2.1. The overflow occurs when an overly long string is passed in the fcd file. To execute this fcd file the victim has to start to start a new "random" test.

tags | exploit, overflow
MD5 | ce864603a5425c1a221e7724fbd7d1bb
ABBS Audio Media Player 3.0 (LST File) Stack Buffer Overflow
Posted Aug 4, 2011
Authored by James Fitts, h1ch4m | Site metasploit.com

This Metasploit module exploits a buffer overflow vulnerability found in ABBS Audio Media Player 3.0. The overflow occurs when an overly long string is passed in the lst file.

tags | exploit, overflow
MD5 | 6b4c8bf1ab72d523a2acb3cfa7deeb7e
Coolplayer 2.19.2 (M3U File) Stack Buffer Overflow
Posted Jul 7, 2011
Authored by James Fitts, Securityxxxpert | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Coolplayer 2.19.2. An attacker must send the file to the victim and the victim must open the file.

tags | exploit, overflow
MD5 | f4eb8ef0c74dc85b32d1f85914912f1f
Freefloat FTP Server Username Stack Overflow
Posted Jul 7, 2011
Authored by James Fitts, 0v3r | Site metasploit.com

This Metasploit module exploits a buffer overflow found in the USER command of the Freefloat FTP server.

tags | exploit, overflow
MD5 | 5194026c94e812df515be6df86382ea5
MicroP 0.1.1.1600 (MPPL File) Stack Buffer Overflow
Posted Jul 7, 2011
Authored by James Fitts | Site metasploit.com

This Metasploit module exploits a vulnerability found in MicroP 0.1.1.1600. A stack-based buffer overflow occurs when the content of a .mppl file gets copied onto the stack, which overwrites the lpFileName parameter of a CreateFileA() function, and results arbitrary code execution under the context of the user.

tags | exploit, overflow, arbitrary, code execution
advisories | OSVDB-73627
MD5 | ab00089e243253bea9b98d2c27a9abc7
Word Builder 1.0 (DIC File) Stack Buffer Overflow
Posted Jul 5, 2011
Authored by James Fitts, h1ch4m | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in Word Builder 1.0. An attacker must send the file to the victim and the victim must open the file.

tags | exploit, overflow
MD5 | 8b2decacb385a51cc1f4731dba3f033f
WordTrainer v3.0 (ORD File) Stack Buffer Overflow
Posted Jul 5, 2011
Authored by James Fitts, C4SS!0 G0M3S | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow in WordTrainer v3.0. An attacker must send the file to the victim and the victim must open the file.

tags | exploit, overflow
MD5 | 91922f12518d1931de6138babb9ec1cc
Fat Player Media Player 0.6b0 Buffer Overflow
Posted Oct 20, 2010
Authored by dookie, James Fitts | Site metasploit.com

This Metasploit module exploits a buffer overflow in Fat Player 0.6b. When the application is used to import a specially crafted wav file, a buffer overflow occurs allowing arbitrary code execution.

tags | exploit, overflow, arbitrary, code execution
MD5 | ff9b15dc97a34dbf1e22ffea5afc7854
SnackAmp 3.1.38 SMP Buffer Overflow
Posted Sep 25, 2010
Authored by James Fitts

SnackAmp version 3.1.38 suffers from a malicious SMP file buffer overflow vulnerability.

tags | exploit, overflow
MD5 | e7073e4e22a71875d4fa9a68b2fdacf0
SnackAmp 3.1.2 SMP Buffer Overflow
Posted Aug 30, 2010
Authored by James Fitts

SnackAmp version 3.1.2 malicious .smp file buffer overflow SEH exploit.

tags | exploit, overflow
MD5 | 6bf157239c630e65eb2271eeb254893e
SnackAmp 3.1.2 Buffer Overflow
Posted Aug 30, 2010
Authored by James Fitts

SnackAmp version 3.1.2 malicious .wav file buffer overflow proof of concept exploit.

tags | exploit, overflow, proof of concept
MD5 | f4d6d52372b33981592f67fdaecd4eb2
Page 2 of 2
Back12Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close