Saint Scanner version 6.6.4 released
SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved.
New vulnerability checks in version 6.6.4:
- Windows URI handling (shell32.dll) remote code execution (MS07-061)
- Windows DNS Service Cache Poisoning Vulnerability (MS07-062)
- Drupal vulnerabilities
- RealPlayer vulnerabilities
- Domino IMAP vulnerability
- Symantec Mail Security for SMTP
- DeleGate vulnerability
- Macrovision InstallShield vulnerability
- Nagios vulnerability
- Tikiwiki vulnerabilities
- QuickTime vulnerabilities
- SonicWall WebCacheCleaner ActiveX vulnerability
- ACDSee image viewer vulnerability
- Symantec Altiris Deployment vulnerabilities
- SonicStage vulnerability
- IMail Client remote buffer overflow
- OpenLDAP vulnerabilities
- CUPS vulnerabilities
- perl vulnerabilities
- Python vulnerability
- Pidgin vulnerabilities
- Ruby vulnerability
New exploits in this version:
- Tivoli Storage Manager CAD exploit
- BrightStor ARCserve LGServer exploit
- Lotus Domino IMAP exploit
- EMC NetWorker Remote Exec service exploit
Post scriptum
Compliance Mandates
|
Related Articles
Saint |
|
Vulnerability Scanner |
|