Saint Scanner version 6.6.3 released
With SAINT® vulnerability assessment tool, you can:
- Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
- Anticipate and prevent common system vulnerabilities.
- Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPPA.
The SAINT® scanning engine is the ideal cornerstone for your vulnerability assessment program. SAINT features a graphical user interface that is intuitive and easy to us
New vulnerability checks in version 6.6.3:
- QuickTime Arbitrary Script Injection vulnerability
- Firebird vulnerabilities
- Interbase vulnerabilities
- JRE, JDK and Java Web Start
- Google Mini Appliance vulnerability
- Cart32 Arbitrary File Read
- ARCserve backup vulnerabilities
- ShellExecute and IE7 URL Handling Code Execution
- Quagga vulnerabilities
- Kaspersky Online Web Scanner ActiveX vulnerability
- Winamp vulnerabilities
- Altnet ActiveX Control remote code execution
- Electronic Arts SnoopyCtrl ActiveX control buffer overflows
- Adobe PageMaker vulnerability
- Firefox, Thunderbird and SeaMonkey vulnerabilities
- RealPlayer ActiveX buffer overflow remote code execution
- Opera Web Browser vulnerabilities fixed in version 9.24
- vulnerabilities fixed by the Quarterly Oracle update
- phpMyAdmin cross-site scripting vulnerabilities
- IrfanView buffer overflow vulnerability
- ARCserve Backup DBASVR buffer overflows (extreme)
- Lotus Notes vulnerabilities
- X font system vulnerability
- TikiWiki vulnerabilities
- X11 OpenSSH security bypass
- OpenSSL vulnerability
New exploits in this version:
- Microsoft SQL Server Distributed Management Objects ActiveX exploit
- Kodak Image Viewer exploit
- CA ARCserve Message Engine exploit
- Windows Shell IE7 URI handling exploit
- RealPlayer playlist name exploit
Post scriptum
Compliance Mandates
|
Related Articles
Saint |
|
Vulnerability Scanner |
|