Saint Scanner updated to 6.4.2
SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:
- Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
- Anticipate and prevent common system vulnerabilities.
- Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPPA
New vulnerability checks in version 6.4.2:
- PHProjekt vulnerabilities
- MySQL denial of service vulnerability
- Woltlab Burning Board SQL injection
- Horde Framework vulnerabilities
- Horde IMP vulnerabilities
- WordPress vulnerabilities
- Internet Explorer 7 cross-site scripting vulnerability
- libwpd vulnerabilities
- Helix Server
- MERCUR IMAPD buffer overflow
- ARCserve Backup Tape Engine RPC vulnerability
- Windows Mail for Vista
- Squid Proxy Trace Request denial of service vulnerability
- Microsoft Windows WPAD request interception vulnerability
- Windows IE WPAD Protocol Implementation Arbitrary Proxy Registration
- Konqueror vulnerabilities
- SQL-Ledger/LedgerSMB vulnerability
- Mozilla Firefox vulnerability
- Lotus Domino IMAP CRAM-MD5 Authentication Buffer Overflow
- PHP vulnerabilities (Month of PHP vulnerabilities)
- Zope vulnerabilities
- OpenOffice vulnerabilities
- Asterisk vulnerability
- Evolution vulnerability
- Multiple GDI vulnerabilities (MS07-017)
- ARCserve Backup Media Server SUN-RPC Procedure 191 Code Execution
New exploits in this version:
- Mercury Mail Transport System IMAP buffer overflow exploit
- ePolicy Orchestrator SiteManager ActiveX exploit
- MERCUR imapd SUBSCRIBE exploit.
- System V login buffer overflow exploit
- MERCUR imapd NTLMSSP exploit