VYPR
Vendor

Safenet

Products
6
CVEs
7
Across products
12
Status
Private

Products

6

Recent CVEs

7
  • CVE-2005-0353May 2, 2005
    risk 0.09cvss epss 0.78

    Buffer overflow in the Sentinel LM (Lservnt) service in the Sentinel License Manager 7.2.0.2 allows remote attackers to execute arbitrary code by sending a large amount of data to UDP port 5093.

  • CVE-2007-6483Dec 20, 2007
    risk 0.06cvss epss 0.33

    Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.0.0 through 7.4.0 and possibly earlier versions, and Sentinel Keys Server 1.0.3 and possibly earlier versions, allows remote attackers to read arbitrary files via a .. (dot dot) in the query string.

  • CVE-2007-3157Jun 11, 2007
    risk 0.04cvss epss 0.10

    IPSecDrv.sys 10.4.0.12 in SafeNET High Assurance Remote 1.4.0 Build 12, and SoftRemote, allows remote attackers to cause a denial of service (infinite loop and system hang) via an invalid packet with certain bytes in an option header, possibly related to the IPv6 support for IPSec.

  • CVE-2008-0760Feb 13, 2008
    risk 0.03cvss epss 0.06

    Directory traversal vulnerability in SafeNet Sentinel Protection Server 7.4.1.0 and earlier, and Sentinel Keys Server 1.0.4.0 and earlier, allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the URI. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-6483.

  • CVE-2008-0573Feb 5, 2008
    risk 0.03cvss epss 0.00

    IPSecDrv.sys 10.4.0.12 in SafeNET HighAssurance Remote and SoftRemote allows local users to gain privileges via a crafted IPSECDRV_IOCTL IOCTL request.

  • CVE-2005-0346May 2, 2005
    risk 0.00cvss epss 0.00

    SafeNet SoftRemote VPN Client stores the VPN password (pre-shared key) in cleartext in memory of the IreIKE.exe process, which allows local users to gain sensitive information if they have access to that process.

  • CVE-2002-2225Dec 31, 2002
    risk 0.00cvss epss 0.03

    SafeNet VPN client allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted Internet Key Exchange (IKE) response packets, possibly involving buffer overflows using (1) a large Security Parameter Index (SPI) field, (2) a large number of payloads, or (3) a long payload.