Saint Scanner updated to 6.4.5
SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:
- Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
- Anticipate and prevent common system vulnerabilities.
- Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPPA
New vulnerability checks in version 6.4.5:
- Microsoft HLP File Handling Heap Buffer Overflow
- Opera vulnerabilities
- ClamAV vulnerabilities
- MS Word vulnerability
- LANDesk Suite vulnerability
- Sami HTTP server vulnerability
- bftpd vulnerabilities
- NetVault vulnerabilities
- Oracle vulnerabilities
- CMailServer cross-site scripting vulnerabilities
- UBB threads cross-site scripting vulnerability
- @Mail cross-site scripting vulnerability
- SQL-Ledger vulnerability
- AOL IM Directory Traversal vulnerability
- Novell GroupWise WebAccess HTTP Basic Authentication Buffer Overflow
- Mac OS X Security Update 2007-004
- IBM Tivoli Monitoring Express buffer overflow
- McAfee VirusScan On-Access Scanner Unicode Filename Buffer Overflow
- MiniShare Denial of Service vulnerability
- FileZilla Client vulnerabilities
- Akamai Download Manager ActiveX vulnerabilities
- ARCserve Backup Media Server SUN RPC Service Buffer Overflow
lighttpd vulnerabilities - FreeRADIUS vulnerability
- MadWifi vulnerability
- PostgreSQL vulnerabilities
- QuickTime vulnerabilities
New exploits in this version:
- LANDesk Management Suite exploit
- Lotus Domino IMAP CRAM-MD5 authentication exploit
- Novell GroupWise WebAccess exploit
- Oracle Database Advanced Replication component exploit
Post scriptum
Compliance Mandates
|
Related Articles
Saint |
|
Vulnerability Scanner |
|