Saint Scanner updated to 6.4.9
SAINT, or the Security Administrator’s Integrated Network Tool, uncovers areas of weakness and recommends fixes. With SAINT® vulnerability assessment tool, you can:
- Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
- Anticipate and prevent common system vulnerabilities.
- Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPPA
New vulnerability checks in version 6.4.9:
- Ingres Database vulnerabilities
- Firebird connect buffer overflow
- Mac OS X Security Update and version 10.4.10
- GDI+ Integer division by zero flaw handling ICO files
- MadWifi DOS vulnerabilities
- IBM TotalStorage DS400 blank telnet passwords
- SNMPc denial of service and default password vulnerability
- Opera visual truncation vulnerability
- Konqueror visual truncation vulnerability
- ClamAV vulnerabilities
- Symantec Reporting Server
- Lotus Domino denial of service
- OfficeConnect Secure Router cross-site scripting vulnerability
- Office 2003 ActiveX denial of service
- OpenOffice buffer overflow vulnerability
- Corel ActiveCGM Browser ActiveX control buffer overflows
- HP System Management Home Page privilege elevation
- Mozilla Firefox 2.0.0.4 vulnerabilities
- Mbedthis AppWeb format string vulnerability
- OpenOffice buffer overflow on Windows
- dotProject vulnerabilities
- Safari for Windows vulnerabilities
- Wordpress vulnerabilities
- YaBB vulnerabilities
- Novell exteNd Director version 4.1
- Trillian UTF-8 vulnerability
- AOL Instant Messenger SIP Denial of Service vulnerabilities
- Safari vulnerabilties
- MyServer vulnerabilities
- VLC Media Player Multiple Format String vulnerabilities
- Apache vulnerability
New exploits in this version:
- Trend Micro ServerProtect CMON_ActiveUpdate exploit
- Internet Explorer Content Advisor exploit
- Apache mod_rewrite LDAP URL exploit
Post scriptum
Compliance Mandates
|
Related Articles
Saint |
|
Vulnerability Scanner |
|