• SafeNet SoftRemote GROUPNAME Buffer Overflow
    Disclosure Date: 2009-10-30
    First seen: 2020-04-26
    exploit/windows/fileformat/safenet_softremote_groupname
    This module exploits a stack buffer overflow in SafeNet SoftRemote Security Policy Editor <= 10.8.5. When an attacker creates a specially formatted security policy with an overly long GROUPNAME argument, it is possible to execute arbitrary code. Authors: - MC <mc@metasploit.com>
  • SafeNet SoftRemote IKE Service Buffer Overflow
    Disclosure Date: 2009-06-01
    First seen: 2020-04-26
    exploit/windows/vpn/safenet_ike_11
    This module exploits a stack buffer overflow in Safenet SoftRemote IKE IreIKE.exe service. When sending a specially crafted udp packet to port 62514 an attacker may be able to execute arbitrary code. This module has been tested with Juniper NetScreen-Remote 10.8.0 (Build 20) using windows/meterpreter/reverse_ord_tcp payloads. Authors: - MC <mc@metasploit.com>
2 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers. Visit metasploit web site for more details
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!