Saint scanner updated to 6.4
With SAINT® vulnerability assessment tool, you can:
- Detect and fix possible weaknesses in your network’s security before they can be exploited by intruders.
- Anticipate and prevent common system vulnerabilities.
- Demonstrate compliance with current government regulations such as FISMA, Sarbanes Oxley, GLBA, HIPAA, and COPPA.
The SAINT® scanning engine is the ideal cornerstone for your vulnerability assessment program. SAINT features a graphical user interface that is intuitive and easy to use.
New features in version 6.4:
- IPv6 compatibility in SAINTexploit
- Requires Socket6 and IO-Socket-INET6 PERL modules available from www.cpan.org
- Encrypted Windows authentication
- Secure authenticated checks against Windows targets
- Full compatibility with Windows Vista
- Requires OpenSSL
- Smaller file sizes for PDF reports
- zlib compression of PDF streams
- Faster target discovery in firewall mode
- Shorter scan times
New vulnerability checks in version 6.4:
- Sun Solaris Telnet worm
- Snort vulnerability
- Microsoft Malware Protection Engine PDF integer overflow
- Trend Micro ServerProtect Buffer Overflow
- Trend Micro OfficeScan Client ActiveX Control buffer overflow
- Mozilla Firefox vulnerabilities
- Mozilla SeaMonkey vulnerabilities
- Mozilla Thunderbird vulnerabilities
- Lotus Domino Webmail names.nsf hidden form field vulnerability
- Mac OS X Security Update 2007-002
- Mac OS X ImageIO GIF Image Integer Overflow
- PHP denial of service vulnerability
- Opera vulnerability
- ClamAV vulnerabilities
- MailEnable Professional and Enterprise
- JRun cross-site scripting
- Cold Fusion vulnerability
- iTunes vulnerability
- Google Desktop vulnerability
- Capital Request Forms configuration file access vulnerability
- MicroTorrent
- Kiwi CatTools TFTP directory traversal
- Cisco IOS IPS vulnerabilities
- JBoss Console access
- SpamAssassin vulnerability
- SupportSoft ActiveX components in Symantec products
- @Mail vulnerabilities
New exploits in this version:
- Solaris telnetd authentication bypass exploit
- Trend Micro OfficeScan ActiveX exploit
- Trend Micro ServerProtect CMON_NetTestConnection exploit
- Trend Micro ServerProtect ENG_SendEMail exploit
- HP Mercury LoadRunner exploit
- NetBackup bpcd command chaining exploit
- CA License Server GCR buffer overflow (added Linux support)
Post scriptum
Compliance Mandates
|
Related Articles
Saint |
|
Vulnerability Scanner |
|