Saint vulnerability scanner updated to v6.7.6
SAINT is the Security Administrator’s Integrated Network Tool. It is used to non-intrusively detect security vulnerabilities on any remote target, including servers, workstations, networking devices, and other types of nodes. It will also gather information such as operating system types and open ports. The SAINT graphical user interface provides access to SAINT’s data management, scan configuration, scan scheduling, and data analysis capabilities through a web browser. Different aspects of the scan results are presented in hyperlinked HTML pages, and reports on complete scan results can be generated and saved.
New vulnerability checks in version 6.7.6:
- Mac OS X Security Update 2008-002
- INFORMIX vulnerabilities
- Kerberos vulnerabilities
- Safari vulnerabilities
- RealPlayer rmoc3260.dll ActiveX control arbitrary code execution vulnerability
- Drupal cross-site scripting vulnerabilities
- ICQ Toolbar ActiveX control vulnerability
- Cisco ACS for Windows User-Changeable Password Vulnerabilities
- Altiris Deployment Server privilege escalation vulnerability
- McAfee CMA Format String vulnerability
- SAP MaxDB vulnerabilities
- ColdFusion vulnerabilities based on APSB0806 to APSB08
- Horde Framework, Groupware and Webmail
- multiple vulnerabilities in OpenCms
- Timbuktu vulnerabilities
- Adobe Form Designer and Adobe Form Client
- MDaemon IMAP vulnerability
- VLC subtitle parsing buffer overflow
- Solaris rpc.ypupdated vulnerabilities
- VMWare Workstation, Player, ACE and Server vulnerabilities
- Novell Groupwise Windows Client API Security Vulnerability
- Home FTP Server remote denial of service
- Registry Pro Insecure method and buffer overflow issues
- SurgeMail and IMAP service multiple vulnerabilities
New exploits in this version:
- Microsoft Excel conditional formatting exploit
- Symantec Backup Exec for Windows Servers ActiveX exploit
Post scriptum
Compliance Mandates
|
Related Articles
Saint |
|
Vulnerability Scanner |
|