Metasploit modules that can be used to exploit Safenet-inc » Softremote
-
SafeNet SoftRemote GROUPNAME Buffer Overflow
Disclosure Date: 2009-10-30First seen: 2020-04-26exploit/windows/fileformat/safenet_softremote_groupnameThis module exploits a stack buffer overflow in SafeNet SoftRemote Security Policy Editor <= 10.8.5. When an attacker creates a specially formatted security policy with an overly long GROUPNAME argument, it is possible to execute arbitrary code. Authors: - MC <mc@metasploit.com> -
SafeNet SoftRemote IKE Service Buffer Overflow
Disclosure Date: 2009-06-01First seen: 2020-04-26exploit/windows/vpn/safenet_ike_11This module exploits a stack buffer overflow in Safenet SoftRemote IKE IreIKE.exe service. When sending a specially crafted udp packet to port 62514 an attacker may be able to execute arbitrary code. This module has been tested with Juniper NetScreen-Remote 10.8.0 (Build 20) using windows/meterpreter/reverse_ord_tcp payloads. Authors: - MC <mc@metasploit.com>
2 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details